00040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x8bffffff00000000, 0x0) 09:21:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000040)=[{&(0x7f0000000140)="18", 0x1}, {&(0x7f0000000000)="e5", 0xfffffe6d}], 0x2, 0x0) close(r3) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x4}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000005e001f"], 0x24}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$netlink(0x10, 0x3, 0xa) splice(r5, 0x0, r6, 0x0, 0x800000ffff, 0x0) splice(r2, 0x0, r5, 0x0, 0x10000, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000003a00)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x1c, r8, 0x305, 0x0, 0x0, {0x15}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x74, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_P2P_OPPPS={0x5}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x4}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x9}, @NL80211_STA_WME_MAX_SP={0x17, 0x2, "5ee9ae9b495b11aaf03bad9713f00f380e3d58"}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x81}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x81, 0x3}}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x74}, 0x1, 0x0, 0x0, 0x24040411}, 0x1) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x24, r10, 0xc15, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x7f}}}, 0x24}}, 0x0) [ 398.189707][T21667] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 398.202287][T21667] EXT4-fs (loop4): get root inode failed [ 398.209061][T21667] EXT4-fs (loop4): mount failed 09:21:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x8cffffff00000000, 0x0) [ 398.237599][T21678] tipc: Started in network mode [ 398.242573][T21678] tipc: Own node identity 7f, cluster identity 4711 [ 398.249399][T21678] tipc: 32-bit node address hash set to 7f 09:21:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5409, &(0x7f0000000100)={0x11}) 09:21:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0xe4ffffff00000000, 0x0) 09:21:53 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r2, 0x0, 0x800000ffff, 0x0) renameat2(r0, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file0\x00', 0x6) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r4, r5) 09:21:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0xf6ffffff00000000, 0x0) 09:21:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x2d, 0x7, 0x1, "34f2e5325d8ae5bbc55b9dd14cdb2b50", "1e4dcbb0a41bba327fd4ded17e83bc18730dd269b403a447"}, 0x2d, 0x2) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 398.833320][T21699] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 398.854155][T21699] EXT4-fs (loop4): get root inode failed [ 398.866012][T21699] EXT4-fs (loop4): mount failed 09:21:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0xfd3f020000000000, 0x0) [ 399.048859][T21726] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 399.062764][T21726] EXT4-fs (loop4): get root inode failed [ 399.069061][T21726] EXT4-fs (loop4): mount failed 09:21:53 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:ldconfig_exec_t:s0\x00', 0x25, 0x2) 09:21:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0xfeffffff00000000, 0x0) 09:21:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 399.208303][T21738] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 399.220559][T21738] EXT4-fs (loop4): get root inode failed [ 399.226393][T21738] EXT4-fs (loop4): mount failed [ 399.368132][T21751] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 399.405359][T21751] EXT4-fs (loop4): get root inode failed [ 399.427610][T21751] EXT4-fs (loop4): mount failed 09:21:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x540b, &(0x7f0000000100)={0x11}) 09:21:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000080)="00f7e80520a5487848708a14e5", 0xd, 0x2}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:21:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0xff01000000000000, 0x0) 09:21:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:54 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r2, 0x0, 0x800000ffff, 0x0) renameat2(r0, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file0\x00', 0x6) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r4, r5) 09:21:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0xff0f000000000000, 0x0) 09:21:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000002c0)=@security={'security\x00', 0xe, 0x4, 0x3e8, 0xffffffff, 0xd0, 0x0, 0xd0, 0xffffffff, 0xffffffff, 0x318, 0x318, 0x318, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@ipv6={@empty, @remote, [0xff, 0xffffffff, 0xffffffff, 0xffffff00], [0xff, 0xffffff00, 0xff, 0xffffff00], 'macsec0\x00', 'macsec0\x00', {0xff}, {0xff}, 0x79c002d335fe9cb4, 0x4, 0x0, 0x50}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@empty, [0xffffffff, 0xff000000], 0x4e20, 0x4e22, 0x4e24, 0x4e23, 0xffff, 0x1, 0xee, 0x80000001}}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x7f, 0x6, 0x1, [0xf580, 0x9, 0x678, 0x91aa, 0x9, 0x7, 0xd85, 0x401, 0x200, 0xaf03, 0x5, 0xfff7, 0x4, 0x9, 0x3, 0x8]}}, @common=@hl={{0x28, 'hl\x00'}, {0x3, 0x6f}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x448) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)={'syz0', "17894abf7e2460798041e8889b33fbaffcc05908523283aff7c11161da3a67a0dc8e9d6bfb09a3ddfda4be99fda279eb47f3604e4f5d722f1c25e5595fb19df721482bebc4a7b079cabbe510a1255f954bbbc69883d919a742"}, 0x5d) [ 399.739840][T21775] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 399.760154][T21775] EXT4-fs (loop4): get root inode failed [ 399.768651][T21775] EXT4-fs (loop4): mount failed 09:21:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0xffffffff00000000, 0x0) 09:21:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) [ 399.998790][T21801] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 400.033699][T21801] EXT4-fs (loop4): get root inode failed [ 400.040396][T21801] EXT4-fs (loop4): mount failed 09:21:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3) [ 400.166476][T21818] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 400.193941][T21818] EXT4-fs (loop4): get root inode failed [ 400.200375][T21818] EXT4-fs (loop4): mount failed 09:21:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x540c, &(0x7f0000000100)={0x11}) 09:21:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x4) 09:21:55 executing program 1: syz_io_uring_setup(0x37fd, &(0x7f0000000040)={0x0, 0xe606, 0x2, 0x3, 0x240}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r2, 0x0, 0x800000ffff, 0x0) r3 = open(0x0, 0x14183e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@qipcrtr={0x2a, 0x0, 0x7fff}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="b205", 0x2}, {&(0x7f0000000140)}, {&(0x7f0000000180)='Q', 0x1}, {&(0x7f0000000580)="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", 0xed0}, {&(0x7f00000001c0)="0e72c13d7b063ff8825f0370a0ad14726870fa8fff57e4a2b1741df8e4c4d94f6d28c5c7d39a566e0819cc2b8930fa3046465dac935a912ceba997902f170f69aeb3f00a60", 0x45}, {&(0x7f0000000240)}], 0x6, &(0x7f0000000300)=[{0x28, 0x101, 0xfffffffd, "893a55c077f933c1d4112a93e07f2f7b2b3794ae"}], 0x28}, 0x0, 0x20000000, 0x0, {0x0, r4}}, 0x9) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r1, 0xffffffffffffffff], 0x3, 0x0, 0x0, {0x0, r4}}, 0xfffffffe) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x100801, 0x0) writev(r5, &(0x7f0000000340)=[{&(0x7f0000001680)="cd", 0xfffffcf0}], 0x1) ioctl$TIOCSETD(r5, 0x5423, 0x0) 09:21:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r3, r4) 09:21:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed4100f4ff0f0000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:21:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x6) [ 400.602279][T21838] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 400.624280][T21838] EXT4-fs (loop4): get root inode failed [ 400.630374][T21838] EXT4-fs (loop4): mount failed [ 400.694302][T21859] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 400.710322][T21859] EXT4-fs (loop4): get root inode failed [ 400.715951][T21859] EXT4-fs (loop4): mount failed 09:21:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="0042000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x1}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@md5={0x1, "fde26b0e5b295b1eb11ac3583526b7ea"}, 0x11, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x9, 0xfe, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, 0x700, 0x700, 0x40, 0x7}}) sendmsg$nl_route_sched(r1, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delchain={0x64, 0x65, 0x4, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r2, {0x8, 0x4}, {0x10, 0x7}, {0xffe0, 0xffe0}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_RATE={0x6, 0x5, {0x9, 0x6}}, @TCA_CHAIN={0x8, 0xb, 0x8}, @TCA_RATE={0x6, 0x5, {0x3f, 0x3f}}, @TCA_RATE={0x6, 0x5, {0xc8, 0x10}}, @TCA_RATE={0x6, 0x5, {0x80, 0x5}}, @TCA_RATE={0x6, 0x5, {0x8, 0x2}}, @TCA_CHAIN={0x8, 0xb, 0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0xc890}, 0x4000000) r3 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x800000ffff, 0x0) accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c) 09:21:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xc) 09:21:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 400.886354][T21876] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 400.898944][T21876] EXT4-fs (loop4): get root inode failed [ 400.904721][T21876] EXT4-fs (loop4): mount failed [ 400.919551][T21884] EXT4-fs error (device loop0): ext4_quota_enable:5994: comm syz-executor.0: Bad quota inode # 3 [ 400.933589][T21884] EXT4-fs warning (device loop0): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 400.947757][T21884] EXT4-fs (loop0): mount failed [ 401.062703][T21892] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 401.074946][T21892] EXT4-fs (loop4): get root inode failed [ 401.080596][T21892] EXT4-fs (loop4): mount failed 09:21:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x540d, &(0x7f0000000100)={0x11}) 09:21:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xd) 09:21:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:56 executing program 1: syz_io_uring_setup(0x37fd, &(0x7f0000000040)={0x0, 0xe606, 0x2, 0x3, 0x240}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r2, 0x0, 0x800000ffff, 0x0) r3 = open(0x0, 0x14183e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@qipcrtr={0x2a, 0x0, 0x7fff}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="b205", 0x2}, {&(0x7f0000000140)}, {&(0x7f0000000180)='Q', 0x1}, {&(0x7f0000000580)="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", 0xed0}, {&(0x7f00000001c0)="0e72c13d7b063ff8825f0370a0ad14726870fa8fff57e4a2b1741df8e4c4d94f6d28c5c7d39a566e0819cc2b8930fa3046465dac935a912ceba997902f170f69aeb3f00a60", 0x45}, {&(0x7f0000000240)}], 0x6, &(0x7f0000000300)=[{0x28, 0x101, 0xfffffffd, "893a55c077f933c1d4112a93e07f2f7b2b3794ae"}], 0x28}, 0x0, 0x20000000, 0x0, {0x0, r4}}, 0x9) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r1, 0xffffffffffffffff], 0x3, 0x0, 0x0, {0x0, r4}}, 0xfffffffe) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x100801, 0x0) writev(r5, &(0x7f0000000340)=[{&(0x7f0000001680)="cd", 0xfffffcf0}], 0x1) ioctl$TIOCSETD(r5, 0x5423, 0x0) 09:21:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0xa) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) pipe(&(0x7f0000000140)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x12) [ 401.503008][T21907] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 401.519655][T21907] EXT4-fs (loop4): get root inode failed [ 401.525918][T21907] EXT4-fs (loop4): mount failed 09:21:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x300) [ 401.731672][T21884] EXT4-fs error (device loop0): ext4_quota_enable:5994: comm syz-executor.0: Bad quota inode # 3 [ 401.744106][T21884] EXT4-fs warning (device loop0): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 401.764606][T21884] EXT4-fs (loop0): mount failed [ 401.772040][T21938] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 401.785098][T21938] EXT4-fs (loop4): get root inode failed [ 401.791441][T21938] EXT4-fs (loop4): mount failed 09:21:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) clock_gettime(0x4, &(0x7f0000000440)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f00000002c0)=""/234, 0xea, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) symlinkat(&(0x7f00000003c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000400)='./file0/file0\x00') symlink(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/file0\x00') lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:21:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 402.162930][T21957] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 402.179361][T21957] EXT4-fs (loop4): get root inode failed [ 402.187894][T21957] EXT4-fs (loop4): mount failed [ 402.190279][T21958] EXT4-fs error (device loop0): __ext4_new_inode:921: comm syz-executor.0: reserved inode found cleared - inode=1 09:21:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5413, &(0x7f0000000100)={0x11}) 09:21:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x600) 09:21:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) clone3(&(0x7f0000000480)={0x280008000, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140), {0x3}, &(0x7f00000002c0)=""/159, 0x9f, &(0x7f0000000380)=""/188, &(0x7f0000000440)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x9}, 0x58) fcntl$setown(r0, 0x8, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:21:57 executing program 1: syz_io_uring_setup(0x37fd, &(0x7f0000000040)={0x0, 0xe606, 0x2, 0x3, 0x240}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r2, 0x0, 0x800000ffff, 0x0) r3 = open(0x0, 0x14183e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@qipcrtr={0x2a, 0x0, 0x7fff}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="b205", 0x2}, {&(0x7f0000000140)}, {&(0x7f0000000180)='Q', 0x1}, {&(0x7f0000000580)="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", 0xed0}, {&(0x7f00000001c0)="0e72c13d7b063ff8825f0370a0ad14726870fa8fff57e4a2b1741df8e4c4d94f6d28c5c7d39a566e0819cc2b8930fa3046465dac935a912ceba997902f170f69aeb3f00a60", 0x45}, {&(0x7f0000000240)}], 0x6, &(0x7f0000000300)=[{0x28, 0x101, 0xfffffffd, "893a55c077f933c1d4112a93e07f2f7b2b3794ae"}], 0x28}, 0x0, 0x20000000, 0x0, {0x0, r4}}, 0x9) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r1, 0xffffffffffffffff], 0x3, 0x0, 0x0, {0x0, r4}}, 0xfffffffe) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x100801, 0x0) writev(r5, &(0x7f0000000340)=[{&(0x7f0000001680)="cd", 0xfffffcf0}], 0x1) ioctl$TIOCSETD(r5, 0x5423, 0x0) 09:21:57 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:57 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000540)='/proc/thread-self\x00', 0x20000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f0000000140)={0x14, &(0x7f0000000080)={0x20, 0x10, 0x12, {0x12, 0x27, "98d9c15350017946cbc10f2547975f24"}}, &(0x7f00000000c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000004c0)={0x44, &(0x7f00000002c0)={0x20, 0xd, 0x9, "c492dd777baad2a80c"}, &(0x7f0000000300)={0x0, 0xa, 0x1, 0x2}, &(0x7f0000000340)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000000380)={0x20, 0x80, 0x1c, {0x6, 0x5, 0x1, 0x0, 0x3, 0x1000, 0x8001, 0x80, 0xfff8, 0x771f, 0xffff, 0x9}}, &(0x7f00000003c0)={0x20, 0x85, 0x4}, &(0x7f0000000400)={0x20, 0x83, 0x2}, &(0x7f0000000440)={0x20, 0x87, 0x2, 0x6}, &(0x7f0000000480)={0x20, 0x89, 0x2, 0x1}}) 09:21:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xc00) 09:21:57 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 402.404012][T21982] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 402.419021][T21982] EXT4-fs (loop4): get root inode failed [ 402.429331][T21982] EXT4-fs (loop4): mount failed 09:21:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:57 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 402.637637][T22012] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 402.652867][T22012] EXT4-fs (loop4): get root inode failed [ 402.659333][T22012] EXT4-fs (loop4): mount failed 09:21:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5414, &(0x7f0000000100)={0x11}) 09:21:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xd00) 09:21:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000e20300000019000f00030004000069", 0x16, 0x8}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000000)={0x2, 0x1, 0x9, 0x9, 0xff, 0x1}) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:21:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) clock_gettime(0x4, &(0x7f0000000440)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f00000002c0)=""/234, 0xea, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) symlinkat(&(0x7f00000003c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000400)='./file0/file0\x00') symlink(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/file0\x00') lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:21:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 403.257008][T22037] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 403.278470][T22037] EXT4-fs (loop0): group descriptors corrupted! 09:21:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1200) [ 403.337617][T22036] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 403.344585][T22036] EXT4-fs (loop4): mount failed 09:21:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) clock_gettime(0x4, &(0x7f0000000440)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f00000002c0)=""/234, 0xea, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) symlinkat(&(0x7f00000003c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000400)='./file0/file0\x00') symlink(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/file0\x00') lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:21:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000080)=0x4) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 403.604164][T22068] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 403.611438][T22068] EXT4-fs (loop4): mount failed 09:21:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5415, &(0x7f0000000100)={0x11}) 09:21:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2000) 09:21:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1200) [ 404.123639][T22095] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 404.135646][T22095] EXT4-fs (loop4): mount failed 09:21:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3f00) 09:21:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 404.279066][T22118] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 404.291456][T22118] EXT4-fs (loop4): get root inode failed [ 404.297092][T22118] EXT4-fs (loop4): mount failed 09:21:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 404.569146][T22140] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 404.581610][T22140] EXT4-fs (loop4): get root inode failed [ 404.590762][T22140] EXT4-fs (loop4): mount failed 09:21:59 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5416, &(0x7f0000000100)={0x11}) 09:21:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x4000) 09:21:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:restorecond_exec_t:s0\x00', 0x28, 0x0) 09:21:59 executing program 1: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1800) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x7f) sendmsg$AUDIT_SIGNAL_INFO(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f2, 0xe10, 0x70bd27, 0x25dfdbfc, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40080}, 0x20000010) bpf$ENABLE_STATS(0x20, &(0x7f00000017c0), 0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000001740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1510848}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYBLOB="01005200", @ANYRES16=0x0, @ANYBLOB="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"], 0x13ac}, 0x1, 0x0, 0x0, 0x10}, 0x4000881) r5 = socket$netlink(0x10, 0x3, 0xa) close(0xffffffffffffffff) splice(r2, 0x0, r5, 0x0, 0x800000ffff, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000001800)='THAWED\x00', 0x7) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x4) r6 = dup(r0) write$P9_RLERRORu(r6, &(0x7f0000001780)={0x11, 0x7, 0x2, {{0x4, 'GPL\x00'}, 0x9}}, 0x11) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[], 0xfffffd88) pipe(&(0x7f0000000140)={0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0xa) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRES16=r0, @ANYRESOCT=r1, @ANYRES64=r9, @ANYRES16=r8, @ANYRESHEX=r1], &(0x7f0000003ff6)='GPL\x00', 0x71, 0xc3, &(0x7f000000cf3d)=""/195, 0x41100, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x400}, 0x10}, 0x78) 09:21:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:21:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff01) [ 404.993799][T22155] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (96 blocks) [ 405.033782][T22162] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 405.046013][T22162] EXT4-fs (loop4): get root inode failed [ 405.053643][T22162] EXT4-fs (loop4): mount failed 09:21:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:21:59 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x809}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x99}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffe}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x80004400}, {&(0x7f00000002c0)="8081000000180000d4f4655fd4f4655fd4f4655f000000000000010080000000100074ed4e5b00000af301000400000000000000413803f8020100003033db41d1efd4f3925a7387f783c27a5793bd54f9889bbdf87978c92ff5a48c7bf7885aa11938fcbf637679d783fa018ed8d3cdfeac85d0587502ef39bbf2c4aebb1ba58790eaa125cfb647ab0bd799592191c24d2e89c7bb9ba97a9ef1bb3f5ba97bd981e815173956d16a637e2c4d76a4a3fbea061147a9a6dfaac522f8e8dca79d5a423dfd37559a7361674a1e88dfa03327086c0da60667", 0xd6, 0x4800}, {&(0x7f0000000080)="119c79d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x42844, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) creat(&(0x7f0000000180)='./file0\x00', 0x11) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r2, 0x0, 0x800000ffff, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f00000001c0)=0x7) [ 405.184502][T22185] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (96 blocks) 09:21:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff0f) [ 405.294856][T22187] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 405.317739][T22187] EXT4-fs (loop4): group descriptors corrupted! [ 405.336178][T22198] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (96 blocks) 09:22:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5417, &(0x7f0000000100)={0x11}) 09:22:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x54, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_FLOW={0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000880}, 0x2) 09:22:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x23ffd) 09:22:00 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r0 = inotify_init() sendmsg(0xffffffffffffffff, &(0x7f0000002340)={&(0x7f0000000000)=@un=@abs={0x0, 0x0, 0x4e24}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="3c2c811e7ea49dcd072229c883b9e6183f8800fe758732aa3f78d7237e2d4a821a685c488b246a9786eaf249354fb9cfc29697a97e9b5dcddfae83f6968c0cdcd46d238e8dec20cf2ade940adc6b6822589306214743f14305f93c57f25f61fce1d9efe6418d763acdf52afc2f105d8ebec6cebf6360bea2c513aeeb0bec", 0x7e}], 0x1, &(0x7f0000000180)=[{0x30, 0x115, 0x1f, "da9c7f853a2411344703e68409629b0d8562443d48b9fe3ab3588055f9df8a"}, {0x90, 0x10f, 0x1, "3e1c9b1a7ba50edece71317b2128024200673d78b26d85ba5a8bf6b9c7c81f4e9199b0e3a22a4ca81d6ed6b80a5176af289cf2387f2f2dfe8fe1daf104163dc99201526a62beca3c24207970a7e73e6c57ec7f64c3846ae919b2ce099da177913e96da4d2ff75c0d3d42b355729960b6713e89bf46f52201e5ba"}, {0x10, 0x117, 0x8001}, {0x1010, 0x117, 0x80, "1bf8c0ef3a941ffa911ff30cb1503ba7084812c111410feeae91ff2c3103fb84ccd8d4c7f5e3c4473e3f42c455f09344f98edf5ec132ea96b536d193bb33fb7e7cd491437db4bcaac05b7b4e69b2e6db2a839576e369c599eef84ca3a25a2a4a5b2f8b788d06ade8d8295cccd94edd18f64d065555192845a96c6cdfe08665276313c207719f9e6ee92e47c70f1dcdd3a7c9315da2a9fe68cc572b7de1ad523dc0f9a362b9d694dfad6ccb574ddc753e0aef63245fdd693632bb02ab2119d11617e10a8cc176fb6ab8301ca6956a8fba4ea331939c6964e0154d4bb9c9960f8525bfefee85808dcd1aba5ce3ac023406b7415a5bc874ba3d98367ad2e6d24ca9fa2fd27f47fc0ae785825f3bf4484182cf9a35ec705813c4975e27153679d3f48e21889bc110b7962159d17704548129cf4ff33c243e6ee8b1d5c52cb79f25e3fec95075f56ab085f482157f17b1ca888a59a9ff660b42a8ca908659e2738e51444cdc287d04b1098b31fe45dff94d8aac5811646873473a5e12f751f6d67eee76840bcc23147c89044b327f8ecb925213dcad1e98f00042a8799ffb3d343da76f274f6b82b3dd456bb3dc35e07cbad89f0536eb1cb81048382ec2c536d8d6c92533cfeaaf08a7e3744f571c27c727b0e5891285ade9793d6a1f6d955902ef4a14d99aea5b6488b372aefe2f5cf4e3b7a39395a8f9d7f63df5b6ac9462db303296981c4b60deb183cf9988e435a59c89ce1ba843272f3b773f7101c3ff79b22b9b81683f8a11d0a4022e3974452ed6e132d0d4dd0d5a706d085fe390bdf976830f89ae28e3a6f850590a25b02919f305bdcb2e1b464dc8e981deaa1861244fe6804a48e3948606d4c8be9d38a91e1b979a570ded6a8cf3609b8a5e2f49db7e1a63801f06472cba8679a1d74c428a1b787c55e2cdff0dab32bfd5dfedb3894a0e27a5202ad2559ac19e23c808ad230f682b059d32d5484ccb3eb8577e900bc716082b7ec3f2c9a1e87294fa9c1414f1cc162b882404d84e5150e12e37a38cef8bc3a79083254b58636cb1e67db326d6961345373c9359cd540a9e2cdfdcaf31a3b146f64f7e8db7a4a9c10efa71d81a3b22f9bd7b29c914e33fd244a9fe06bbb46bd8a769b92299f3a75b18972e8f3301cfcc1505a8eef2e5f24ee8020a55b4fba121bf5a5e9a288a2864428f93f1ff2ec46ae5769c9ee49087d3dd0c8275c3ed348f4b761851354e6ce11a9f61a3a61f80b637b83ca74a9e32efd4d4b17d12a9b822f2cffe212214b96c016284ca044d6956bd4345b6156b5b3fce8eec676d1941cdcbd837af939fb4d555f79f7d11d567d0a4873615fd6551247daa7c3c7454b4072e1a378651d8fd3dfd3677dd95736e198fe6363a0400fb69e6f1729302675122f8ac398161529d8260bc0335df026870c52974268e01dd0cad24b1f0ce45be62b1baf0719f3908e6d40d5c9787d1a9e73212088fd6efd36c8744d248a1406ef1e46d83d1ad893396ee6b7026b6a13d7e5e54533360041315f172991dd947db69b7716a30a16594f07d44f7ee0c578f37cab83255d71d41d4f9a56bc32495c7e1b645554e21b3290fb812b11fff9108dcd272a553c874bf6ea51a1814ce41a1e9f5c1ca0c4c4dcd6c631902885e45798c00002a6e8e2b739dfcbf5cfa4e14d7187ea0ea3d076e7681f0f7a8df6d2ae570e912260099157e5fedb61bef639220b0b4380d3de9c523ef5c27c997d30fabc2f598a62ae6ec625b6c4612f6f7f8f38e20d713f1c07ea1d2b6287b8d0b7ebd34f0f7bae4b321287d7013454e4406a8899b987e0ee82c25a5145a47c058f94a5b9586023d3ddef15f65641823ad90fd27aa24dca9774884ce089b59c315b86bf716e845d222fe6a61ce92f860b27a49ce02839fab96ccb6fa92a5986fb4ed8d12a64bca3785ac03c0d059f32992be9d86864845e9fa81df4fcf6b7d86fe468f855ce00f6a3260856eb9b7196dd46a69af468c953f466fd0d805d3a94b159d0eb6ee9dafbdf23e9bb56f6e6eb684ff6738e75f9a52f9b790b52d90b05b29137ebc8e1b3ececd8e42538d736d6ccda1ba30e601635b4e05f799fe4f5ac10ee4485768f0e057db1cb5f7c30ea4dc418c329e92f3b9c93ea05964bef0111743614eb0d1658d295d1cbd6f61a290e9a74c4c880c27a64e8468f67d740f915723acd64c10d2ad7c743951a2509197bc150d017876cd0c54153a1bef95dc42ad971ca98c0de15ee0a973b26bbf7a2e5b2b66db63a44f69a724c080cb1dd2c7d7621beb0ff776aa2eac73d8631e439566b5724f3ecc97bd6a718d93d7cd2df17bfa3ba5cf988ed71cd9cded6694a1b31ec66d3874f2e0b1bcf465f774d92adecf0f12e8c80499c0f5435985c24a9ef18293f107c62759ce5122862f18fa665c7b0e133631f119b572703b8b8a5a9853d5f1f0f43401e46a6082f79dfb663e936dfdd67e8da38c542bcf0d739db317642803afcd3e1932fc2ca4a8881811c5960321bb19339ebc6248f5b23d56231aeb602b1a79cd51bca39498d49dad670a82fd138cbc359a3227406302c7e4338ffef5ea435c8a851d0f96419728aeca19296bccc1d0f7111df7f24177968836a8d33aa68aaaca6321d31e5e4a4568943a083adae89acb5a5e341cc84d3df0df63200cdd0ba486a87684925ad218edbe6504ee6000cee5c4cfd4fa4863edf83ce5509e0bf86250f375384f655d9cf502ed65c8d632654e5c37b2d4ba5fc6c606d18a914a58e0ea4ca44556c2f9531767e30ea5702003ae12f29154fe25460072ee8fee39ab99bd7a3603aff34f8a5bf5d71f521c81765114104e9cc1086557b37fac67d76786c41938cb9b9ba0e678705c637ac51166bcdcc9efee6b405ef886807c1a0389f30092390f5cff85676ae6d3761574a9d708e9908a7022da282a20d5764f9fcebda336fe8d75455b9bc6338d510dda329bc47a6575ebb2f68fecbc6ff56af7fe5f62ebcbe736929adb547948bf169bf43b7c2ff14a313a1cbaa70b2423af862771a6f201acb884bfcab10070bb44b8b457b45856f2f9ccac75687e552219fb617944b2d024e935635282d57e93e8bbb58470325256e1c217c85b703149912fb196099dc6ded7943b2ae498cea9edac3568d860f6d2f2ca9a5c715bfc49c417c05ed045cf5c02e292fd142d63698a29df7b324c5253dc7de1b51efda9f6e6bf54f56831c5cd4202b87c3e81914fbb7ac02f8a5ed92e0ff42062301762dff66bcdd88e15ab1a12749b58585ee3fb8a2e3abae41a47ab7f978b0fc20339a9670669ddd8ec53f00d67c0d68e69b34373251d5b602f8b2a5d83b9f84fde98b654bca771b4f777911a943b0fa1b1537217251031fe1f4d14dce9d0f0fe6f64a8ea3115c28c38d286e205d7c922b18d21373c425c0cd9194110ba4ca3fe41fe66a588153fdcd168ec3491f55a3f82a8c0eedbcc588a61aac36561cbeb882ba8b83972657fe8920570b52c08805c96786b2479ca7cf067d1e3a724d12c0948b9da87f850bc104fe5892dc4e3881ad75febaac4e5a523a019caa565cf8a39fa7e0275828c2f6fa884a1b83919d7b80c6272cc1825a352a0e39a88a1c97f83100c2399135bab7b2ea330f0084838c91426074f176f7bea80a6ff1937bb9bcb46eed13536c8f7351b1df79fce21e7059a228bc5e87cbaf1e93bf0b115cc188a0d151b1adaabe27598fb26c5fd693269ac41127c6623634d7de765fd5af23396212e6e75a01910c4382eaa1462513ad7d2e57a1d93081eab1dc343a9bd2d02eaf827ddc006f9e5920a678f876b5613d78c920c40d823daba4247539f2b21e117ae7712b8ec3b2e435549e156003d2064d1eabf542eaee1afdadc37abd1e7af8b81ba28f14bea716ef2148a6866ee832d7a04fd933c4f04146641de55d9394c0770fa79e60b3d2a58f3c403ff08b85260b78e66bd2b07fd61c1fe6664d0027547e955f3a17dae2e41187ebb2ec3ccae1751baf9cfcf7c330c720095fb8b65ba93c65dea1f0f763fc0b9dda9e2ab35d0c92eb078fb14b1fa43876ffa74808440e4ae90084b19dde4ebb7b67ef26a920b991b5cd095db0a36404fc70a1be6609a49cb8b387d493eb179f898f9da98b34b92791db89caf5bfe2b0ce3ad419f72133e107b4c808670e00afe0dd0ab6a94bb6b9e3b9b02de6159151d34c4134164a5f16f42e6c9e849d8d231d461e7db3ac2936b218e38c81e394e916a26ca26f13c8fc97ad4f069f13b1a8260bf3c839b0a6119a3f16434a7f64a88342445b509ecc42be0a985a97b2cd67d5376704b3478ceaf31e854b264c88c02b72a65cbf4417d0970c8d922aaf08f6732b3936c505f0bc0557a6d6bfa9f9613fc26e0fff0d5f6d02c41f11f8b8c83f1fb2e5ade137f92f3b108ae05b599e0da83820eb1366ecb473025fb884421a3c82828348e573c4c47205c2170bc3084cf513e20bbe9151ca63ff5e4f0868664e47fb712631f29ae70d3db4fecc428321ff8b13196347e91804a53ef65a7901a4903837c638777ae619c4035fd4062ca46eebfe578821ec980b95676aec1d7f21044fac27d73cd513282be4cec4c9656ba97d1bbda0ed0e4c1d9972e51d9e2717c3b7e881b60c80f75449767f8879c58ddc6097c6a85850288f664f85d1a3a01b118bb909bc8e17856382181a883356f1dd1f3a1912c4c2745c2e9d58fe1a71ed5e40d2aa2eb581267c8c4f787045aca6c9fdd857a1cdce0c5e846c558dc6991aa9d658cce821d50facec07d4123a0f3c5d05107932a1bf08c6c9813ec2f0d8da4de838bc603962659aeee500286a6e2a12f8df837039f26a23bc2dacf9ffd49038a7f02ec690167d69f0ec5602492f8657a7a43781db2f00c5af2ebc52c85e210c8da5d6666fdad41f94668a15feb178943780400a46b263e6ae85a13e12b1a81c4e12977831c3a25514e3180e40126ba1b5fe12217bd99dd6aff088a9dc58feeb3726a6f25a04a017a7647895004ef552a7d1efb2f9fd98ac2c41dd8d9929b66ad71731026f1233e23f94259b7305836762bfdf441ba50bb3c0109cb815567437eb8cedc53bfb749d4fab1f4c92f3988fbae331bde7b228c3cb92de8c21edd2a2bdc6120857df684b74d7b6d4f26f1c5cfe21a96bb474931a45369f96efa1d473b409c3c0cf8cb2175c04b77b4bc1044ce434e7f0781a096218711fbf3150d1455c2fa49960f607b1da92dd56e351045296b7ff2c260d29418902d50eda784f493d45957f8afa5a21409f8a15e0c606693d78b93d53145de67f4cfacc203b43fb278065c3df0b3479b8b59174366fb6bc0e59d138da0c2791b353fb80649e6a6712ec2014cc62d6cb9baecccb3d0e587a0e5089eedb621955569dbee1a6a4ef2d9a6e0a573dd0076cbf7c25d3ba3d88a2593e9f62fef71dc949aa70331aa419c3138a870c193ecd27989ed5562d710fe153a93ddad378190e0034c8ad73bac740684ca94e3edf16623a4b1b5841bfba334a846e6a58806ede8afab96a750d80a815f7ee377349d815225fced2fdd17ee3addd1c988343e8d0a4a502d1fd291f451f9e53ad81ae8685a180f1555bd82adf2da3d162677d549c2e3010a3e00e0adaab6390210135ba05495d251f0e16c55469b678372e83b123a28f528afebb13fea1e9e8f2afc8bf3ccb8f75552a4a4e3ccaaaf0afb6493ee09765bf8148c6a86ebc2d10714f4766187e096634bffae6021b5a6dfb33dd3885fa57f195296e0ae62fd4c6f9c9bf81adbbd0b3bda31f4926bdda68411991c6a5e260ba489"}, {0x28, 0x110, 0x1, "c32bc61a8c0557645cfb125bc02e5b7157d281148b"}, {0x1010, 0x1, 0x7, "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"}, {0xa0, 0x10d, 0x401, "8cb2550a2b559a256964b15fbaa3ba830d01a8f677a5fe88c8986799460c2815e368b567e13fbae707270e9cd409514a5917e78746246d83a9b4a62b27c7bc189935c8e533e3210b12aa9da2f2bc980823abc9c3f020746c74d570613d51f0121e47904fd85a142a46cc367edfe2a1c9890b27e0aa4c71faded483142a6023f7283cd9d87c6f2d1690ca32"}], 0x21b8}, 0x14) inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x40) inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) 09:22:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x400000) [ 405.906190][T22224] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 405.926026][T22224] EXT4-fs (loop4): group descriptors corrupted! [ 406.059752][T22247] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 406.070420][T22244] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 406.080972][T22247] EXT4-fs (loop4): group descriptors corrupted! [ 406.084680][T22244] EXT4-fs (loop5): mount failed 09:22:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5418, &(0x7f0000000100)={0x11}) 09:22:01 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x7}, 0x7) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) 09:22:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x800000) 09:22:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x5, &(0x7f00000014c0)=[{&(0x7f00000002c0)="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", 0x1000, 0xc5}, {&(0x7f0000001300)="b20491a74999d93468213dce4c83d5b3c9b73d03b3afe9a9260f7878de4e10a0450f238254559a05c951ee45a7723e954b1a5d0fea5df297d2b3fe4007b7f0e334d55797ec3e4b6afaeb21f58a932e054c7213c071e42d438bc77f611c9c33784908b014630d6607d22185968ba7faebe1fc66def5312f2befc8a192efa28b", 0x7f, 0x7f}, {&(0x7f0000001380)="caae48d7caca567446be44f51225ed8cd95ca99930b0d60cd574bba10f4dc19a4df3e2da6ac75dde5f77c1bb3912249957b17e5bd98befff6c8574cf676d92a81e834fdc5e9fdabd25d537b4990e44059d3fce9d2f6a2b2a3ff5d7ebce732e1cc3b22da02400bd6a845d98c5f4217c4fdc2869bddf7b6f8fa9df3c4235aa43311014ccbe201fddbad115f591108a5776e3ea964ac43de5f10dddd4ec4499508fb7dae9c5d2e71bd257d08f74efa4e9a1a3165f78bf54174ad340da06eba363053d799e75782a5588c9cf346a950099", 0xcf, 0xf2}, {&(0x7f0000000140)="0b0245ca94f39a66e0955f9c423e82b361b2aa5a49a2456890e582e06203f9c7a4749efb713a0c053ef73f6e6cd28adec3", 0x31, 0x5}, {&(0x7f0000001480)="13383c1335b8aff89af3731183583986f094dba6dcfef22c3fdf0b4e12cd5d43", 0x20, 0x6}], 0x808801, &(0x7f0000001540)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@noinit_itable='noinit_itable'}, {@nogrpid='nogrpid'}, {@dax='dax'}, {@discard='discard'}, {@nobh='nobh'}, {@data_journal='data=journal'}, {@noblock_validity='noblock_validity'}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}], [{@appraise_type='appraise_type=imasig'}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}]}) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r0 = socket$unix(0x1, 0x2, 0x0) r1 = accept$unix(r0, &(0x7f0000001600), &(0x7f0000001680)=0x6e) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000016c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000001700)={0x0, "457b5278dbe00dfbcbb7323336f0d45c"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000002700)={{r2}, {@val={r3}, @actul_num={@void, 0xfb}}}) 09:22:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x2008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000003c0)={0xf, 0x1f, 0x1, 0x2363}, 0xf) syz_usb_connect$cdc_ncm(0x2, 0xba, &(0x7f00000000c0)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xa8, 0x2, 0x1, 0x0, 0x10, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x7, 0x24, 0x6, 0x0, 0x1, "f908"}, {0x5, 0x24, 0x0, 0x6c7d}, {0xd, 0x24, 0xf, 0x1, 0xffffffff, 0x4, 0x51c, 0x5}, {0x6, 0x24, 0x1a, 0x7, 0x38}, [@mdlm={0x15, 0x24, 0x12, 0x6}, @mbim_extended={0x8, 0x24, 0x1c, 0x1, 0x6, 0x6}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x6, 0x5, 0x7, 0x1}, @mdlm={0x15}, @mbim={0xc, 0x24, 0x1b, 0xc3, 0x7fff, 0xf9, 0x0, 0x2, 0xa9}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x4, 0x3, 0x75}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x440, 0x5, 0x9, 0x4}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x5, 0x7, 0x69}}}}}}}]}}, &(0x7f0000000340)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x40, 0x8, 0x8, 0x20, 0x12}, 0x1d, &(0x7f0000000180)={0x5, 0xf, 0x1d, 0x3, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x8, 0x9, 0x8, 0x1}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x0, 0x2, 0x3}, @ext_cap={0x7, 0x10, 0x2, 0x18, 0x2, 0x6, 0x1ff}]}, 0x5, [{0x52, &(0x7f00000001c0)=@string={0x52, 0x3, "b0407b5087e3ca460f0e66f75ed9e80b55e9ffe18e0b764ff0b1d16601300fab4abff5149bab0e0eebdd9e17f7730f0786e128682b863d8c032715c524f3efc4502c38406335c1ebbc2b944dae756df0"}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x4001}}, {0x2f, &(0x7f0000000280)=@string={0x2f, 0x3, "099878d3a0c2bffbff14b5b93e2488bc336efe4b9949e6cc7642f8685eb515ed7392884c7f8c4b100c39879675"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x40e}}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000480)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r1, 0x200, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0xfe2bf26cf4a4837e}, 0x0) 09:22:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1000000) 09:22:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 406.801478][T22272] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 406.813831][T22271] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 406.820974][T22272] EXT4-fs (loop4): group descriptors corrupted! [ 406.828675][T22271] EXT4-fs (loop5): mount failed 09:22:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:01 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@v1={0x2, "d03f5ada9d5bb3aa08"}, 0xa, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r2, 0x0, 0x800000ffff, 0x0) getpeername$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@random={'osx.', 'default_permissions'}, &(0x7f0000000500)='rootmode', 0x8, 0x0) syz_mount_image$fuse(&(0x7f00000000c0)='fuse\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030301f000000303030303030303030303134303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee00, @ANYBLOB=',default_permissions,obj_role=security.ima\x00,seclabel,defcontext=unconfined_u,uid=', @ANYRESDEC=r3, @ANYBLOB=',uid<', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) open(&(0x7f0000000540)='.\x00', 0x0, 0x552386a4c504b79c) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) r4 = syz_io_uring_complete(0x0) ioctl$USBDEVFS_REAPURB(r4, 0x4008550c, &(0x7f0000000080)) [ 406.991963][T22300] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 407.002067][T22300] EXT4-fs (loop4): group descriptors corrupted! [ 407.007876][T22294] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 407.023170][T22294] EXT4-fs (loop5): mount failed [ 407.066962][ T3115] usb 2-1: new full-speed USB device number 29 using dummy_hcd [ 407.085469][T22308] fuse: Bad value for 'fd' 09:22:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 407.156565][T22310] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 407.170656][T22310] EXT4-fs (loop5): mount failed [ 407.466971][ T3115] usb 2-1: not running at top speed; connect to a high speed hub [ 407.546996][ T3115] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 1088, setting to 64 09:22:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x541b, &(0x7f0000000100)={0x11}) 09:22:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2000000) 09:22:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 407.665339][T22322] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 407.679623][T22322] EXT4-fs (loop5): mount failed [ 407.693297][T22323] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 407.704583][T22323] EXT4-fs (loop4): group descriptors corrupted! 09:22:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 407.717034][ T3115] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 407.726107][ T3115] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 407.734672][ T3115] usb 2-1: Product: é ‰í¸ìŠ ï®¿á“¿ë¦µâ¾ë²ˆæ¸³ä¯¾ä¦™ì³¦ä‰¶æ£¸ë•žî´•鉳䲈豿á‹ã¤Œéš‡ [ 407.747813][ T3115] usb 2-1: Manufacturer: ä€ [ 407.752438][ T3115] usb 2-1: SerialNumber: Ð… [ 407.797418][ T3115] cdc_ncm 2-1:1.0: bind() failure [ 407.808647][ T3115] cdc_ncm 2-1:1.1: bind() failure [ 407.817599][T22333] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 407.831861][T22342] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 407.834661][T22333] EXT4-fs (loop5): mount failed [ 407.842887][T22342] EXT4-fs (loop4): group descriptors corrupted! [ 407.856464][T22345] fuse: Bad value for 'fd' [ 408.010024][ T12] usb 2-1: USB disconnect, device number 29 09:22:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x6, "e0f71cf4"}, 0x6, 0x3) 09:22:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3000000) 09:22:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x541d, &(0x7f0000000100)={0x11}) 09:22:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 408.550266][T22364] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 408.567826][T22364] EXT4-fs (loop5): mount failed [ 408.623661][T22367] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 408.638747][T22368] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:22:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x4000000) 09:22:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000014a00)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000002c0)={0x0, {{0x2, 0x4e22, @private=0xa010100}}, {{0x2, 0x4e23, @private=0xa010100}}}, 0x108) lseek(r0, 0x7, 0x1) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 408.668545][T22367] EXT4-fs (loop4): group descriptors corrupted! [ 408.675303][T22368] EXT4-fs (loop1): group descriptors corrupted! [ 408.680772][T22381] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 408.696093][T22381] EXT4-fs (loop5): mount failed 09:22:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x6, "e0f71cf4"}, 0x6, 0x3) 09:22:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x6000000) [ 408.947638][T22398] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 408.959019][T22398] EXT4-fs (loop4): group descriptors corrupted! [ 408.974831][T22403] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 09:22:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x6e6bb1, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x38, 0xc, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x2004c000}, 0x0) 09:22:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 409.078545][T22413] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 409.088168][T22413] EXT4-fs (loop4): group descriptors corrupted! [ 409.095905][T22410] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 409.110227][T22410] EXT4-fs (loop5): mount failed [ 409.226686][T22428] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 409.236291][T22428] EXT4-fs (loop4): group descriptors corrupted! 09:22:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x541e, &(0x7f0000000100)={0x11}) 09:22:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xc000000) [ 409.415363][T22438] __quota_error: 12 callbacks suppressed [ 409.415370][T22438] Quota error (device loop5): dq_insert_tree: Quota tree root isn't allocated! [ 409.430778][T22438] Quota error (device loop5): qtree_write_dquot: Error -5 occurred while creating quota [ 409.430844][T22439] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 409.452927][T22439] EXT4-fs (loop4): group descriptors corrupted! 09:22:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xd000000) 09:22:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000480)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f0655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000080)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f00000002c0)="66209712cb4af8ca71a89e36d1228f289d3bd25ccc6ea391fada386b455c714af51ded7075dc1d34175ab77cfc5689ba3bc179451ac4487c3e2a53eca3e63bf3dcd35c5b1855985d2cddadf5fdda799b42518e85343771284d05ac832e8734592545588ade30578d1fba2bdae9162667b06b1781b599c0b11deb247cd300588f62327543f6dd", 0x86, 0xffffffffffffff52}, {&(0x7f00000000c0)="307a97e4cf498154064620096fb18b0768079ce3b09c25daeaef7d3b9c05c0e8d2d9c2e4969809f8edbf1708ec", 0x2d, 0x7ff}, {&(0x7f0000000380)="979ff90c2e0fe4ff77cf102038f7b89f37ebca52bc44cc804e87dd13d54e277528f6628750b92804b09bd37ead8fa24d72473efe047264607f3a8619c43f9c4874d518784163d7c9b9d4e6830948611d36af5f36c99d9a43b23bd26991c5a47c4e", 0x61, 0x7}, {&(0x7f0000000400)="80f7d14896ad4a99f6f9ec1f02d376f67438af0d985dc2f0c9ee6bbd03265fee9007fdba99f33cb921f7abf3b94f0b4bac79109075409a95f31dda78a0b670c69c8274764a716388f1fac8d7ff5ba15974602f2d37b455f7379f6788acc4cb78f4c1c0da7ed563c030ffc4e0f296315367babd75", 0x74, 0x100000000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "174075969c00"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000140)={0x1, 0x5, [@broadcast, @broadcast, @random="3e07937d6355", @multicast, @dev={[], 0x33}]}) 09:22:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 409.765890][T22456] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 409.775379][T22456] EXT4-fs (loop4): group descriptors corrupted! 09:22:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x12000000) [ 409.834139][T22455] Quota error (device loop5): dq_insert_tree: Quota tree root isn't allocated! [ 409.854916][T22455] Quota error (device loop5): qtree_write_dquot: Error -5 occurred while creating quota [ 409.874933][T22473] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) 09:22:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 409.884686][T22473] EXT4-fs (loop4): group descriptors corrupted! [ 410.022586][T22483] EXT4-fs warning (device loop1): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 410.036861][T22483] EXT4-fs (loop1): mount failed [ 410.082397][T22489] Quota error (device loop5): dq_insert_tree: Quota tree root isn't allocated! [ 410.094748][T22489] Quota error (device loop5): qtree_write_dquot: Error -5 occurred while creating quota 09:22:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x541e, &(0x7f0000000100)={0x11}) 09:22:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x6, 0x0, 0x5, 0x0, 0x0, 0x7ff}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/246, 0xf6}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x2, 0x0, 0x45122343, 0x3, 0x0, 0x944}, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x9) io_setup(0x1ff, &(0x7f00000004c0)=0x0) open(0x0, 0x143042, 0x1) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x80000, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 09:22:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x20000000) 09:22:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3f000000) 09:22:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 410.314208][T22507] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 410.325201][T22504] Quota error (device loop5): dq_insert_tree: Quota tree root isn't allocated! [ 410.329536][T22507] EXT4-fs (loop4): group descriptors corrupted! [ 410.335462][T22504] Quota error (device loop5): qtree_write_dquot: Error -5 occurred while creating quota 09:22:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, 0xee01) 09:22:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x40000000) 09:22:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 410.573930][T22528] Quota error (device loop5): dq_insert_tree: Quota tree root isn't allocated! [ 410.598027][T22528] Quota error (device loop5): qtree_write_dquot: Error -5 occurred while creating quota 09:22:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x38000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 410.739483][T22535] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 410.773621][T22535] EXT4-fs (loop4): group descriptors corrupted! [ 410.971948][T22556] EXT4-fs warning (device loop0): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 410.986258][T22556] EXT4-fs (loop0): mount failed 09:22:05 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5421, &(0x7f0000000100)={0x11}) 09:22:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3f000000) 09:22:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8bffffff) 09:22:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0xee01) 09:22:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8cffffff) [ 411.312946][T22581] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 411.323472][T22581] EXT4-fs (loop4): group descriptors corrupted! 09:22:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8bffffff) 09:22:06 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x38, &(0x7f0000000200), 0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRES32, @ANYRESDEC, @ANYRESHEX=r1, @ANYRES64=r1, @ANYRES32=r1, @ANYRESOCT=r0, @ANYRESOCT=r0]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000440)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000480), 0x4) [ 411.385549][T22601] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 411.396074][T22601] EXT4-fs (loop4): group descriptors corrupted! [ 411.780042][T22621] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 09:22:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5423, &(0x7f0000000100)={0x11}) 09:22:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xe4ffffff) 09:22:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8bffffff) 09:22:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:06 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RATTACH(r1, &(0x7f00000001c0)={0x14, 0x69, 0x2, {0x8, 0x3}}, 0x14) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x28, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)='macvlan1\x00', 0x0, 0x8000, 0x8000}) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f0000000200)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @private}, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffffa5000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r2 = syz_io_uring_complete(0x0) write$P9_RRENAME(r2, &(0x7f0000000300)={0x7, 0x15, 0x1}, 0x7) 09:22:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 412.044379][T22636] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 412.056252][T22636] EXT4-fs (loop4): group descriptors corrupted! 09:22:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xf6ffffff) [ 412.197101][T22651] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 412.202838][T22651] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 412.211581][T22651] loop1: p5 size 1073741824 extends beyond EOD, truncated 09:22:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfd3f0200) 09:22:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x5) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 412.351151][T22657] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 412.363796][T22657] EXT4-fs (loop4): group descriptors corrupted! 09:22:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5424, &(0x7f0000000100)={0x11}) 09:22:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfeffffff) 09:22:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000280)='.\x00', 0x2a4) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r2, r4) inotify_rm_watch(r0, r4) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:07 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x400002200006007, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) unshare(0x44000600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xa) splice(r3, 0x0, r4, 0x0, 0x800000ffff, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@flushsa={0x118, 0x1c, 0x100, 0x70bd28, 0x25dfdbff, {0xff}, [@extra_flags={0x8, 0x18, 0x60da}, @lastused={0xc, 0xf, 0x6c}, @proto={0x5, 0x19, 0x2b}, @tmpl={0xc4, 0x5, [{{@in=@private=0xa010101, 0x4d4, 0x6c}, 0x2, @in=@multicast1, 0x0, 0x0, 0x2, 0x1, 0x16, 0x400, 0x6}, {{@in6=@private1={0xfc, 0x1, [], 0x1}, 0x4d5, 0x2b}, 0x2, @in=@rand_addr=0x64010101, 0x0, 0x3, 0x0, 0x4, 0x7fffffff, 0xfffffb57, 0x20}, {{@in6=@mcast1, 0x4d3, 0x6c}, 0xa, @in6=@mcast2, 0x3504, 0x2, 0x0, 0x6f, 0x9, 0x80000000, 0xffffff00}]}, @lifetime_val={0x24, 0x9, {0x2, 0x2, 0x7b3, 0x100000000}}]}, 0x118}, 0x1, 0x0, 0x0, 0x800}, 0x80) ioctl$CHAR_RAW_PG(r0, 0x1262, 0x0) 09:22:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff010000) [ 412.907887][T22694] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 412.926535][T22696] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 412.951484][T22694] EXT4-fs (loop4): group descriptors corrupted! 09:22:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 412.972562][T22696] EXT4-fs (loop5): mount failed 09:22:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff0f0000) 09:22:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 413.111624][T22725] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 413.121385][T22725] EXT4-fs (loop4): group descriptors corrupted! [ 413.141164][T22728] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 413.156959][T22728] EXT4-fs (loop5): mount failed 09:22:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 413.277524][T22735] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 413.294574][T22732] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 413.304235][T22735] EXT4-fs (loop5): mount failed [ 413.305739][T22732] EXT4-fs (loop4): group descriptors corrupted! 09:22:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5425, &(0x7f0000000100)={0x11}) 09:22:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffff8b) 09:22:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7, 0x4b, 0x1}, 0x7) 09:22:08 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/122, 0x7a) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000140)) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x7c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth0_to_batadv\x00'}}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x4004) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) socketpair(0x11, 0xfdb636b588a02d89, 0x7fff, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x1, 0x4) r4 = syz_io_uring_complete(0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'syztnl0\x00', 0x0, 0x2f, 0x1b, 0x5, 0x4, 0x50, @remote, @mcast2, 0x10, 0x0, 0x1ff, 0x400}}) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000440)) sendmsg$DEVLINK_CMD_TRAP_GET(r2, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x50, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0x50}, 0x1, 0x0, 0x0, 0x44014}, 0x40091) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f00000005c0)=0x3) getsockopt$IP_SET_OP_GET_FNAME(r3, 0x1, 0x53, &(0x7f0000000600)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000640)=0x2c) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000680)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') pipe2(&(0x7f0000000740)={0xffffffffffffffff}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r5, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x6c, r6, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NL80211_ATTR_PID={0x8, 0x52, r1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x806, 0x3}}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r7}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x3}}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000041}, 0xc0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000880)) 09:22:08 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) r4 = socket$inet6(0xa, 0x80002, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x2b, 0x800000003, 0xd60) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r7, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) bind$xdp(r3, &(0x7f0000000080)={0x2c, 0x4, 0x0, 0x6, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8923, &(0x7f0000000000)={'lo\x00'}) 09:22:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffff8c) [ 413.823824][T22763] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 413.838039][T22767] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 413.848304][T22767] EXT4-fs (loop4): group descriptors corrupted! 09:22:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 413.867168][T22763] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 413.882160][T22763] EXT4-fs (loop5): mount failed [ 413.910257][T22788] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 09:22:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffffe4) [ 413.920279][T22788] EXT4-fs (loop4): group descriptors corrupted! [ 413.943481][T22783] : renamed from lo 09:22:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 414.004210][T22791] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 414.015384][T22791] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 414.033445][T22791] EXT4-fs (loop5): mount failed [ 414.112413][T22801] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 414.122819][T22801] EXT4-fs (loop4): group descriptors corrupted! 09:22:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5427, &(0x7f0000000100)={0x11}) 09:22:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfffffff6) 09:22:09 executing program 0: ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f00000002c0)=0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) syz_usb_connect(0x3, 0xaf8, &(0x7f0000000380)={{0x12, 0x1, 0x310, 0xe5, 0xdd, 0x69, 0x20, 0x803, 0x4310, 0x9402, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xae6, 0x3, 0xf8, 0x5, 0x20, 0x1, [{{0x9, 0x4, 0x40, 0x8, 0xb, 0x70, 0x2c, 0x31, 0x20, [@uac_as={[@format_type_ii_discrete={0xf, 0x24, 0x2, 0x2, 0xfffb, 0x5, 0x2, "8360bd453a57"}, @format_type_ii_discrete={0xc, 0x24, 0x2, 0x2, 0x8, 0x7ff, 0x0, 'EOM'}, @format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x40, 0x3, 0x3f, 0x3f}, @format_type_i_discrete={0xe, 0x24, 0x2, 0x1, 0x8, 0x4, 0x7, 0x6, "4ffd1367e4d2"}, @as_header={0x7, 0x24, 0x1, 0xff, 0x1, 0x1002}]}, @uac_as={[@format_type_i_discrete={0xf, 0x24, 0x2, 0x1, 0x29, 0x2, 0x8, 0x7, "f682fbfb7d20c3"}, @as_header={0x7, 0x24, 0x1, 0xf8, 0x3, 0x5}, @as_header={0x7, 0x24, 0x1, 0x20, 0x4}]}], [{{0x9, 0x5, 0x4, 0x10, 0x258, 0x0, 0x7, 0x40, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x4}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x8001}]}}, {{0x9, 0x5, 0xa, 0xc, 0x200, 0x1, 0x9, 0xc, [@uac_iso={0x7, 0x25, 0x1, 0x47, 0x5, 0x15c}, @uac_iso={0x7, 0x25, 0x1, 0x3, 0x1, 0x7}]}}, {{0x9, 0x5, 0xe, 0x0, 0x7ff, 0xcb, 0xf8, 0x9}}, {{0x9, 0x5, 0x2, 0x8, 0x228, 0x7f, 0x0, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x4}, @generic={0xda, 0x22, "f9f983c9f0f5ffb9573bc3f9d4f33a767e6883a32489181b8cf3c0668b5a11258e39794d77fe6c9054a920914e872f835130b598ed3dbc27203545e156a85f4361e9994300d0bcb1cd5736d0e9594c6885f58de68d33e371bb2ce9f34d872dc5341a3ed56c28779245a98a28edf2296e3eb113a7e54620ae9be14f395d2b36613f5237ece41b39342eb8299cac9ef7c0e992d528a635ed8ec3168844d263a57b28aae457e06fb19da06fa34849126ac6f3c486caa8e8fdb68c236c7b4e53033bcff48353fd24bee83a24f9f563f3fa01274e7dcf473f6c65"}]}}, {{0x9, 0x5, 0x3, 0x10, 0x40, 0x1, 0x7, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x66, 0x5}]}}, {{0x9, 0x5, 0x6, 0x10, 0x20, 0x1, 0x3f, 0x81, [@generic={0x5d, 0x31, "bd7ad5a0a402814c1d0c9f853abb3043fd95e96d7878ae131e612e867d4a36aaf0534fa2740fa7750e8f206d7eab08b7a3f4a8ad00ae1c9db149dd4b44733e3608b3cce13c6928686a84c86de0f2ac2f90126efbe305cd783f781e"}, @generic={0xe4, 0xae8ebcef993aa63b, "cac8ff2d7cc28d3db68de93df7af32824fbb40eb2435c5734ed660bedf6741177ebe128e6a29f1ef0ca3a7ddfcd5043b9302dff4e616aa1e4177864944d92b620ad9e8ef6a09d19531d880c52ded1ad4c41e76d3f6c9cd93bd26cd299191927e790519144064425c9cef42ebcd780413fbc89d1ad3e2788bc22e0743729fd2a15df60eaa62924c7858558e21421b7bd1268db916b1315a67822925b4c2ab3d4482164d12c17f458171fb7ead51d8e4002e38ccfa2689a96cf63bbc907bf0fcead8bcd15bccf48702bf330c9854dd95944d49253d009c75c8e75b31787ffcf2197210"}]}}, {{0x9, 0x5, 0xe, 0x3, 0x20, 0x7f, 0x1, 0x4d, [@generic={0x86, 0x24, "6698549c71464811d45bb362432d4d7e3f0b0dc3ba2750fc9b07444927785718362f7bc0540c6794074c98fce8fb93a18334b62ecfcbeefe727a451687d92c3759b923c7bfa770108ca15c10d4d3864206c4ea021d72cce5dbbe57f49e792cb75c57d4af12fbf4370da624e970f5b016dffc0c938b35dfe2cb06c04e68c3bce02e17e69a"}]}}, {{0x9, 0x5, 0xd, 0x0, 0x40, 0x7, 0x81, 0x1, [@generic={0xa2, 0x21, "d57cbfb033dd70840f667c6caafc62692dd9f1ecc7e8e19a3b8ba48eb0ba4034dbb8276d87e9250eca8edfa3070b7d76bb423d2527b3de70cc28c939619b6932f5d528dba0f1950476b17853dcbc131dcee608dcd6fe337580132ebfb63eca4881dd175f8f116b63ed159ed21c369c6076cfc309b93cdc9ead89b8cc72ca45a44808f365c429a1f68273efff8a141b60e88802255166176af115a8daff5c016c"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x20, 0x1}]}}, {{0x9, 0x5, 0x3, 0x1, 0x40, 0x40, 0x9, 0xff, [@generic={0xa3, 0xf, "7e6dda21a69d2fdf5cbd27ade65940e46c7a1c820d34417c719f0ada9a6e4701522b855ce693c518e9ade4c7aaee91001575390d73525249e4af0f5e31cbf3c5cf3f73a3c843ce172d825b9e2aea638a00d4627d6459af22be83dca3047558ef57821b6199f1dc8ce49edfec4942e8ea5ae5720700f55fc92bc0bc41569be12e667f6a29b03da4aaafb228a2045338e45416132b96faaef2afb2cbe9a99b0dc3a6"}]}}, {{0x9, 0x5, 0x5, 0x8, 0x218, 0x0, 0x3f, 0x3e, [@generic={0x70, 0x7, "b7e5b8db14a0cf0657694e4ac9405579df26ba70eb75cf81f40b9ff70d44584ec8a1aee63b6ad4d8b073b57d5fac94bbe46e8e61b5c794456e5dd6506d4ac90af72d146aaf80e16d0f51b348577ac9318e0cc12e0a88dc3196a5c10c20ba8beb935e86b02b55351906dd8829c77a"}]}}, {{0x9, 0x5, 0x80, 0x2, 0x8, 0x5, 0x3, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x1, 0x3}]}}]}}, {{0x9, 0x4, 0xf9, 0x2, 0xb, 0xb, 0x64, 0x6d, 0x6, [@cdc_ncm={{0x9, 0x24, 0x6, 0x0, 0x1, 'n}a\n'}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x200, 0x6, 0x0, 0x6}, {0x6, 0x24, 0x1a, 0x9d, 0x4}, [@acm={0x4, 0x24, 0x2, 0x9}, @network_terminal={0x7, 0x24, 0xa, 0x3f, 0x4, 0x29, 0x2}, @mbim_extended={0x8, 0x24, 0x1c, 0x6, 0x2}, @obex={0x5, 0x24, 0x15, 0x7}, @obex={0x5, 0x24, 0x15, 0x3}]}, @cdc_ecm={{0xb, 0x24, 0x6, 0x0, 0x0, "471fd8904ce3"}, {0x5, 0x24, 0x0, 0x800}, {0xd, 0x24, 0xf, 0x1, 0x9, 0x5, 0x7f, 0xfe}, [@mbim_extended={0x8, 0x24, 0x1c, 0x2, 0x81, 0x1}, @country_functional={0x12, 0x24, 0x7, 0x5, 0x1000, [0x6, 0x4, 0x2, 0x42cd, 0x6, 0xffff]}, @mbim={0xc, 0x24, 0x1b, 0x5, 0x166, 0x2, 0x5, 0x6, 0x7}, @mdlm_detail={0x35, 0x24, 0x13, 0x18, "b943221d037d77253088ba852dd417493b304fd363ae99435f1051e266522975c33833a4d7f9eea3fa08089100d8ddd4c0"}, @mbim={0xc, 0x24, 0x1b, 0xff, 0x7, 0x80, 0x3, 0x4, 0xff}]}], [{{0x9, 0x5, 0xb, 0x2, 0x3ff, 0x20, 0x8, 0x3e, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0xff, 0x4}]}}, {{0x9, 0x5, 0x6, 0xc, 0x0, 0xfc, 0x7, 0x8}}, {{0x9, 0x5, 0x1, 0x8, 0x400, 0x1f, 0x7, 0x6b}}, {{0x9, 0x5, 0x8, 0xc, 0x8, 0xee, 0x20, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x5, 0x7}, @generic={0xde, 0xd, "631e2c4370244fe74cce33d82426894bb8139d6dd8f92d6c611768ecf116838690938f67cc886e5344f269060f41269bef79a64d2cdf2850213e5b6a4283bf1b8445535f63e4820280b933e736f1e4b248f00e33ec0bdce9c58e0657167545aee349c8688c7eb53ccac7139d45ef3d149df02f38afe93cfb3bb80ef874e3590cc0422e456788e80f928f7b9cad16fec593cf9ce550088e33ceb5cf82f25ea2ebfd1ae0d753d7d8083cd54ba4403fa705b838fdb3e36375ded78ceb6ec9697143bdc91ed6d6d5005857ecf2e648b2e9695d08375a07b44591db15bbb5"}]}}, {{0x9, 0x5, 0x6, 0x2, 0x200, 0x9, 0x80, 0x1f}}, {{0x9, 0x5, 0x7, 0x10, 0x3ff, 0x80, 0x1, 0x5}}, {{0x9, 0x5, 0xc, 0xd, 0x8, 0x3, 0x3f, 0x9}}, {{0x9, 0x5, 0x4, 0x0, 0x618, 0x2, 0x8, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x83, 0x9}]}}, {{0x9, 0x5, 0x0, 0x10, 0x10, 0x9, 0x0, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x7}, @generic={0xa0, 0x21, "3f61f212cee1e0e84cf68e1ed1a78c32c13fbe7c3db5f24cc8088a179a67ac3bf376196e24a2b2d9e31844616502789a430a9fdff024bba50289b3f5966ffd9a36b3fd9d0ac1b9b93b7fbe3b963a8fb1637a14f92a782555a68741edb157f544602fa00ea16fe144a879f4d6bb5b0f8010af8f4d7840c09643ab81306228286b20e0a6b8cfac5e886b55f2d11ec08598b983a2e1fd3850e481e6fc98abfc"}]}}, {{0x9, 0x5, 0x3, 0x4, 0x3ff, 0x2, 0x1, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0xf8, 0x7f}]}}, {{0x9, 0x5, 0xe, 0x10, 0x8, 0x7f, 0x1f, 0x1, [@generic={0xaa, 0x1, "9f7e6056dd6d4a316b8c4630912bc2b81ddc2405048793b50199f2046e04e4c59e01df588327c4b16571cfc313ffbf2c31e6a799e7c653c3a463985deb7732c8fcc3e1d8d55736d51603526fb0b1816e369791c76b2d05ffabd36e2d99eacf00787ead9279273663415ea26866fb1555b47320bd34aa2faee92b2fa02307c1a13b77c9d6bcc0c5f9240dde62b3da54e5d37778ae6f7e35752e146cb666f70348ab87bf940faa078d"}, @generic={0x13, 0x1, "c2726a2f0507fa3c4e5d197821f700d847"}]}}]}}, {{0x9, 0x4, 0x4f, 0x7f, 0x5, 0xff, 0xad, 0xf6, 0x0, [@generic={0xbc, 0x7, "9713ae392ac83eae34bda9258f1f07f1b4cbcbd63ad8242aea67fd7d73af8ac515687c955f345bc5a5f21c199ddd75b04bc622d95cd9efb7846efdb4026929422464a87c5c93d8571e9637ef488f1804e8d7a146892a7d1c689c41c442cd705ed9a22b2ea5b4466d375a60755e8b8db1dd1786ae7f566445827f926256838d1fe63dd492316c122da9d6a0c24c418638aa148ee29f34d5bbd78b9dc82f988b641f99aca8492d35cf80132c7d463e017dcc5230c2945bc0dbffbe"}], [{{0x9, 0x5, 0xd, 0x0, 0x3ff, 0xea, 0x2, 0x9, [@generic={0xf1, 0x3, "eb5e06c1630abd5e0ca9c59937c06e8a4bb57928a063177c2ac0163ae5ceda5798117f7033f63cba8f8643f4766e5b92b17026421085b0d5cca574020bdeb55d5736b8e2731431e866b2a2f8aea7d4b3588e9bf1556c5a1e50bd2dc0c06a20900ed60750effd0476c0fa76052bf9f76df4d2cb86478a8187696c1b9ba2edfc4b396310af1cff7aa9e0979dfb305fb31ef7016d30d3d6b86a0df2aa9e4800f3bfe16b1e2849f23ac686f6704437af3e7b8992a67af3d52b247081318d9c3ec32c990a606fc6f3546ef7e8bb96b7ceaed631722b735d510be18a2046b3db28402716d6d4022847c6e6ca718d812cd3a4"}]}}, {{0x9, 0x5, 0x8, 0x1c, 0x400, 0x9d, 0x81, 0xb1}}, {{0x9, 0x5, 0xf, 0x10, 0x10, 0x1, 0x1f, 0x7}}, {{0x9, 0x5, 0x5, 0x4, 0x40, 0x6, 0x24, 0x40}}, {{0x9, 0x5, 0x85, 0x2, 0x20, 0x97, 0x7, 0x40, [@generic={0x1f, 0x22, "043ded2fdb8556d89fd3cbff9b78a40f3ee30d69e9c6320a142fb3e5c6"}]}}]}}]}}]}}, &(0x7f0000000f80)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x201, 0x0, 0x9, 0x0, 0x40, 0x5}, 0x6e, &(0x7f0000000e80)={0x5, 0xf, 0x6e, 0x6, [@ss_container_id={0x14, 0x10, 0x4, 0xc7, "d8f4ee5bb0a79d2b2c4df11fe3835632"}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x4, 0xdb3f}, @ext_cap={0x7, 0x10, 0x2, 0x1a, 0x8, 0x8, 0x8}, @ext_cap={0x7, 0x10, 0x2, 0x12, 0x2, 0x2, 0x1ff}, @ssp_cap={0x24, 0x10, 0xa, 0x2, 0x6, 0xfff, 0xf0f, 0x6, [0xff0000, 0x3f6f, 0xf, 0xff0030, 0x3f0f, 0xf]}, @ssp_cap={0x1c, 0x10, 0xa, 0xa, 0x4, 0x6, 0xf00, 0x1, [0x3f00, 0x3f00, 0xff2e, 0xff3f58]}]}, 0x1, [{0x74, &(0x7f0000000f00)=@string={0x74, 0x3, "1606e99b058c02331e0545a7c8108a3082edc79deaa25e5fc80b1df0a0a0eede14ad11a1b2c194a017d61526578e4361a761871433baf451093c500a615c87c98feff4c820ada5ae5b559b78e29932b56a6ba8ab0cbfd1fe1594b040094ee072b7dd78d91a8eee62e9cef9f1f537f74e9e04"}}]}) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x10001}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r2 = accept$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x10, 0x3fb, 0x800, 0x70bd2c, 0x25dfdbff, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20004011}, 0x20000011) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/bsg\x00', 0xc0400, 0x0) fchdir(r3) dup(r2) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) 09:22:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:09 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) r4 = socket$inet6(0xa, 0x80002, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x2b, 0x800000003, 0xd60) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r7, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) bind$xdp(r3, &(0x7f0000000080)={0x2c, 0x4, 0x0, 0x6, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8923, &(0x7f0000000000)={'lo\x00'}) 09:22:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfffffffe) [ 414.718972][T22816] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 414.732639][T22816] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 414.758194][T22816] EXT4-fs (loop5): mount failed 09:22:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x10000000000) [ 414.948674][T22840] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 414.972866][T22840] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 414.989730][T22840] EXT4-fs (loop5): mount failed [ 414.993091][T22852] : renamed from lo [ 415.016249][ T5420] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 415.256228][ T5420] usb 1-1: Using ep0 maxpacket: 32 [ 415.456257][ T5420] usb 1-1: config 248 has an invalid interface number: 64 but max is 2 [ 415.464608][ T5420] usb 1-1: config 248 has an invalid interface number: 249 but max is 2 [ 415.473379][ T5420] usb 1-1: config 248 contains an unexpected descriptor of type 0x1, skipping [ 415.482271][ T5420] usb 1-1: config 248 contains an unexpected descriptor of type 0x1, skipping [ 415.491187][ T5420] usb 1-1: config 248 has an invalid interface number: 79 but max is 2 [ 415.499442][ T5420] usb 1-1: config 248 has no interface number 0 [ 415.505671][ T5420] usb 1-1: config 248 has no interface number 1 [ 415.511927][ T5420] usb 1-1: config 248 has no interface number 2 [ 415.518243][ T5420] usb 1-1: config 248 interface 64 altsetting 8 endpoint 0x4 has invalid maxpacket 600, setting to 64 [ 415.529215][ T5420] usb 1-1: config 248 interface 64 altsetting 8 endpoint 0xA has invalid maxpacket 512, setting to 64 [ 415.540168][ T5420] usb 1-1: config 248 interface 64 altsetting 8 endpoint 0xE has invalid maxpacket 2047, setting to 64 09:22:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5428, &(0x7f0000000100)={0x11}) 09:22:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x40000000000000) [ 415.551216][ T5420] usb 1-1: config 248 interface 64 altsetting 8 endpoint 0x2 has invalid maxpacket 552, setting to 64 [ 415.562591][ T5420] usb 1-1: config 248 interface 64 altsetting 8 has a duplicate endpoint with address 0xE, skipping [ 415.574107][ T5420] usb 1-1: config 248 interface 64 altsetting 8 has a duplicate endpoint with address 0x3, skipping [ 415.585363][ T5420] usb 1-1: config 248 interface 64 altsetting 8 endpoint 0x5 has invalid maxpacket 536, setting to 64 [ 415.607466][ T5420] usb 1-1: config 248 interface 64 altsetting 8 has an invalid endpoint with address 0x80, skipping [ 415.618958][ T5420] usb 1-1: config 248 interface 249 altsetting 2 bulk endpoint 0xB has invalid maxpacket 1023 [ 415.630403][ T5420] usb 1-1: config 248 interface 249 altsetting 2 has a duplicate endpoint with address 0x6, skipping [ 415.641799][ T5420] usb 1-1: config 248 interface 249 altsetting 2 endpoint 0x1 has invalid maxpacket 1024, setting to 64 [ 415.656538][ T5420] usb 1-1: config 248 interface 249 altsetting 2 has a duplicate endpoint with address 0x6, skipping [ 415.672686][ T5420] usb 1-1: config 248 interface 249 altsetting 2 endpoint 0x7 has invalid maxpacket 1023, setting to 64 [ 415.674359][T22877] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 415.685397][ T5420] usb 1-1: config 248 interface 249 altsetting 2 has a duplicate endpoint with address 0x4, skipping [ 415.701931][T22877] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 415.720484][ T5420] usb 1-1: config 248 interface 249 altsetting 2 has an invalid endpoint with address 0x0, skipping [ 415.728253][T22877] EXT4-fs (loop5): mount failed [ 415.732430][ T5420] usb 1-1: config 248 interface 249 altsetting 2 has a duplicate endpoint with address 0x3, skipping [ 415.747742][ T5420] usb 1-1: config 248 interface 249 altsetting 2 has a duplicate endpoint with address 0xE, skipping [ 415.758957][ T5420] usb 1-1: config 248 interface 79 altsetting 127 has a duplicate endpoint with address 0xD, skipping [ 415.770328][ T5420] usb 1-1: config 248 interface 79 altsetting 127 has a duplicate endpoint with address 0x8, skipping [ 415.781769][ T5420] usb 1-1: config 248 interface 79 altsetting 127 has a duplicate endpoint with address 0x5, skipping [ 415.793111][ T5420] usb 1-1: config 248 interface 79 altsetting 127 has a duplicate endpoint with address 0x85, skipping [ 415.804617][ T5420] usb 1-1: config 248 interface 64 has no altsetting 0 [ 415.811890][ T5420] usb 1-1: config 248 interface 249 has no altsetting 0 [ 415.819344][ T5420] usb 1-1: config 248 interface 79 has no altsetting 0 [ 415.986269][ T5420] usb 1-1: New USB device found, idVendor=0803, idProduct=4310, bcdDevice=94.02 [ 415.995454][ T5420] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 416.004033][ T5420] usb 1-1: Product: syz [ 416.008554][ T5420] usb 1-1: Manufacturer: syz [ 416.013427][ T5420] usb 1-1: SerialNumber: syz [ 416.036255][T22831] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 416.258983][T22831] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 416.268802][T22831] EXT4-fs (loop0): group descriptors corrupted! [ 416.307608][ T22] kauditd_printk_skb: 12 callbacks suppressed [ 416.307616][ T22] audit: type=1326 audit(1600939330.982:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=22812 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:22:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x11012, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x80000000000000) 09:22:12 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) r4 = socket$inet6(0xa, 0x80002, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x2b, 0x800000003, 0xd60) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r7, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) bind$xdp(r3, &(0x7f0000000080)={0x2c, 0x4, 0x0, 0x6, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8923, &(0x7f0000000000)={'lo\x00'}) 09:22:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5437, &(0x7f0000000100)={0x11}) [ 417.726376][T22913] EXT4-fs mount: 133 callbacks suppressed [ 417.726386][T22913] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 417.747541][T22914] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 09:22:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x100000000000000) [ 417.773418][T22925] : renamed from lo [ 417.794847][T22912] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 417.805641][T22912] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 417.820221][T22912] EXT4-fs (loop5): mount failed [ 417.834230][ T5420] usb 1-1: USB disconnect, device number 5 09:22:12 executing program 0: ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000080)={0x3, 0x1}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x7, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f00000000c0)="03", 0x1, 0xb}, {&(0x7f0000000540)="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"/472, 0x1d8, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x2000000, &(0x7f0000014a00)=ANY=[]) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x1b8, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_OURS={0x18c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc8, 0x5, "42fe0d9eb916794071a8794afe22194a3b2f14b1e01a67cb84dff6c6e7dd7dd3251a10cbce7b8c529fefcc600ca36371562567731c045da1bbe15f12f0098b639ba038c268160164f84c9eb512cefd617bc7b863c5110c6e921822438c170620b1d41b7b9f4be0236d9340f938d0f0f01f71c4e13e8d7725fba439e04016717c0af6c445c1fa21a8ba4a226efafdb1ecb11d217b7518e7e5acc629e62c55459e68e3a008368898b7871e81e328cb5278524d4d77d93633cc98af1365cabd4e634a411538"}, @ETHTOOL_A_BITSET_BITS={0x24, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.ima\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x95, 0x4, "e46fec87d40f88f984d0e5b84076c67ebd767cdb49251494c6fd8eb9d771d7fe6583d296db2db3e6ea998d50ff60780055a4636e9b075f6a559c8b9c7b700a5c94a48d9c744232194b07b3438038e634fdacae9d5f223714b1607348e5d3e1d57ad6704e75dad8845591d83011071b0032d96faa0ad6d0f1f79989300db4756e7131de1d5d21bb8f74065aefcf3cbceeb9"}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x81}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}]}, 0x1b8}, 0x1, 0x0, 0x0, 0xa4}, 0x4044011) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 418.007375][T22935] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 418.016598][T22943] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (96 blocks) 09:22:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) symlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00') setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 418.070608][T22948] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 418.083756][T22946] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 418.092888][T22948] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 418.107333][T22948] EXT4-fs (loop5): mount failed 09:22:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x200000000000000) 09:22:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 418.251603][T22956] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 418.352906][T22963] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 418.399494][T22970] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 418.411308][T22970] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 418.429730][T22970] EXT4-fs (loop5): mount failed [ 418.441672][T22971] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 09:22:13 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) r4 = socket$inet6(0xa, 0x80002, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x2b, 0x800000003, 0xd60) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r7, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) bind$xdp(r3, &(0x7f0000000080)={0x2c, 0x4, 0x0, 0x6, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8923, &(0x7f0000000000)={'lo\x00'}) 09:22:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x300000000000000) 09:22:13 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5441, &(0x7f0000000100)={0x11}) 09:22:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) fchown(r3, 0x0, r2) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000340)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xffffffffffffffff}], {}, [{0x8, 0x3, r0}, {0x8, 0xe, r2}, {0x8, 0x0, 0xee00}, {0x8, 0x0, 0xee01}], {0x10, 0x2}, {0x20, 0x3}}, 0x4c, 0x2) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 418.585562][T22982] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 418.586816][T22987] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 418.611598][T22994] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 09:22:13 executing program 0: r0 = dup(0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=@ipv4_newroute={0x2c, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfe, 0x0, 0xfe, 0x2}, [@RTA_OIF={0x8, 0x4, r3}, @RTA_PREFSRC={0x8, 0x7, @rand_addr=0x64010101}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000880)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0x44c, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_WOL_MODES={0x374, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x72, 0x5, "dd2cb778b1bc44894fc9e83f45311e0c96a10704d9c4bcf126e892baa2a529e5163ace3547808d10afef843fa06c515c6772df12759dcfc1b93c9449efc367b0d4bbf64e4ba6d668c69fd0a8e6ce6111624c761746b54759e92435f588e27022b34bf9857dbedeaacaaa48660ec6"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_VALUE={0xb5, 0x4, "b4ed311488a353eb7137d284a912f47b0384c0d497998198fcab674189bf600d0174f74fc6d4d8290c13d6ebb1a97993244442530ef5482433a3b6153b82335ac167080a3f92d60c2f3dc55dbdbb2a08bcac4a7f6adffcf5f11fb8d5eaca007be1a0d2fea5b26f8fa3fd8382bdfe2900da119e9492ec6854d7ef2ba7482be7052f2ea4f005ceeb0b107914a37d5da7557ccd27fdff76e011ec9e57d3b0c7728f4016a5c04d836040cad55a7a3a16f4a191"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x120, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'ext4\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x51}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.ima\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xcc8}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.ima\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']\xe2$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'ext4\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xa3, 0x5, "f3b2646e9f23753878ebb6e694f3d73e6131a19886f88558e2efb5de0c7ee19ced368f888f4e2097790be7c709eea803976969b91de50f89968e38f6b6a2829d2efe2497006155a518f45f14d986070fc05b073277b02311f90b3adc7fb4c2838dbd1c7b355efc5af579ad9b56f00a97a6d8051584e10892e7ae6ef4775112e375ed43da8184d3a7f72738e2e7e5b5f386536c2e837c529539eb75222474b1"}, @ETHTOOL_A_BITSET_MASK={0x66, 0x5, "52063e0ed5b017ca772161804876858df61695e99158e76979379ebd3767ae412afb8bc0786f7c2b1cc6ff4758a828c7ca09d3116df4764c18d1ab903d57c0cd7dd16160a9816610a5e37003b2cbd94898a0927ecef3a31029489f3b971c829b1827"}]}, @ETHTOOL_A_WOL_SOPASS={0x71, 0x3, "bdf5d457f6b0abe431bf0fc3214a92dd316dfe757231295f1b21ba69691ec07f4e104aae7be3bbd17637182e6df9ecba702f57f2a4247112d432569c520a9dae85ddbf9d428e90d94d3712abdf7d1d84385108d0f9a7f96113eae6a435784e0da1de7be7f3bae48d3e38c2c7ac"}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}]}, 0x44c}, 0x1, 0x0, 0x0, 0x800}, 0x440448d1) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000080)={@rand_addr, @broadcast, 0x0}, &(0x7f00000000c0)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x11, 0x7da, 0x1, 0x101, 0x204, 0x1, 0x1f, [], r5, 0xffffffffffffffff, 0x1, 0x4, 0x1}, 0x40) ioctl$BTRFS_IOC_QGROUP_CREATE(r4, 0x4010942a, &(0x7f0000000340)={0x1, 0x6c8}) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 09:22:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x400000000000000) [ 418.641184][T22988] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 418.659307][T22988] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 418.674380][T22988] EXT4-fs (loop5): mount failed [ 418.719501][T23010] : renamed from lo 09:22:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x600000000000000) [ 418.897560][T23009] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 418.913866][T23017] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 418.932249][T23024] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 418.954044][T23024] EXT4-fs (loop5): mount failed [ 418.954945][T23023] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 419.083907][T23032] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 419.098023][T23033] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:14 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x2b, 0x800000003, 0xd60) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r6, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) bind$xdp(r3, &(0x7f0000000080)={0x2c, 0x4, 0x0, 0x6, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'lo\x00'}) 09:22:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xc00000000000000) 09:22:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x34, 0x1, 0x4, 0x301, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x7}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x34}}, 0x800) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = getegid() ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r10 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) fchown(r10, 0x0, r9) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000400)={0x3c8, 0xfffffffffffffff5, 0x0, [{{0x6, 0x2, 0x4, 0x40, 0x8, 0xfffffff8, {0x1, 0x800000, 0x6, 0x3, 0x8, 0x3, 0x1ff, 0x3f0d, 0x800, 0x8000, 0x68d9, r1, 0x0, 0x7ff, 0x1}}, {0x3, 0x8, 0x5, 0x8, 'ext4\x00'}}, {{0x1, 0x2, 0x5, 0x9, 0x3, 0x3b, {0x0, 0x8, 0xffffffffc688a1df, 0x9, 0x2, 0x0, 0x8001, 0x4, 0xd836, 0xa000, 0x20, r3, r4, 0x0, 0x4}}, {0x4, 0x1, 0x3, 0x2, '&:-'}}, {{0x3, 0x2, 0x2, 0x0, 0x21, 0x81, {0x0, 0x5, 0x7, 0x4, 0x6, 0x80, 0xadb, 0x5dbf, 0x3, 0xa000, 0x7, 0x0, 0x0, 0x3e9, 0x6}}, {0x4, 0x6, 0x5, 0x1, 'ext4\x00'}}, {{0x6, 0x3, 0x7, 0x6, 0xffffff01, 0x81, {0x3, 0x2, 0x73, 0x0, 0x80000000, 0x40, 0x8, 0x4, 0x9, 0x2000, 0x4f22, r6, r7, 0xfffffffb, 0x401}}, {0x3, 0x7, 0x0, 0x6}}, {{0x6, 0x2, 0x1, 0x9, 0x3, 0x200, {0x4, 0xf527, 0x401, 0x0, 0x9, 0xffffffffffffff7f, 0x80, 0x7, 0x6, 0x4000, 0x9, 0xee00, r9, 0x6, 0x5}}, {0x0, 0x4, 0x5, 0x2193b02f, 'ext4\x00'}}, {{0x0, 0x2, 0x3f, 0x1, 0x0, 0x8f, {0x1, 0x8, 0xffffffffffffb3a4, 0x2, 0x36, 0x9, 0x0, 0xac4, 0x2, 0x1000, 0x400, 0x0, 0xee01, 0x5, 0x6b7}}, {0x3, 0x0, 0x4, 0x6000000, '{\')]'}}]}, 0x3c8) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5450, &(0x7f0000000100)={0x11}) 09:22:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 419.528318][T23061] EXT4-fs (loop4): unsupported descriptor size 0 [ 419.538468][T23057] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 419.539812][T23062] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xd00000000000000) [ 419.573481][T23059] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 419.587864][T23059] EXT4-fs (loop5): mount failed 09:22:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x51, 0xba, 0xfad5, {0xcaa, 0x7}, {0x1, 0xfffb}, @const={0xffc0, {0x7, 0x5, 0x650, 0x40}}}) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 419.738827][T23078] EXT4-fs (loop4): unsupported descriptor size 0 [ 419.752724][T23080] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 419.766810][T23080] EXT4-fs (loop5): mount failed [ 419.773044][T23085] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1200000000000000) [ 419.896814][T23097] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 419.897978][T23091] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 419.915382][T23097] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 419.935347][T23097] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 419.949614][T23097] EXT4-fs (loop5): mount failed [ 420.039553][T23102] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:15 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x2b, 0x800000003, 0xd60) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r6, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) bind$xdp(r3, &(0x7f0000000080)={0x2c, 0x4, 0x0, 0x6, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) 09:22:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x87, @local, 0x4e21, 0x4, 'sed\x00', 0xa, 0x4, 0x2d}, {@remote, 0x4e22, 0x0, 0x6, 0xd3aa, 0xff}}, 0x44) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2000000000000000) 09:22:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5451, &(0x7f0000000100)={0x11}) [ 420.407539][T23120] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 420.416792][T23126] EXT4-fs (loop4): unsupported descriptor size 0 [ 420.417846][T23118] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 420.432673][T23119] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 09:22:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) creat(&(0x7f0000000080)='./file0\x00', 0x1d) 09:22:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3f00000000000000) [ 420.451077][T23119] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 420.461870][T23119] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 420.476208][T23119] EXT4-fs (loop5): mount failed 09:22:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 420.654740][T23148] EXT4-fs (loop4): unsupported descriptor size 0 [ 420.662695][T23142] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 420.683280][T23142] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 420.685226][T23150] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 420.703851][T23142] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 420.722289][T23142] EXT4-fs (loop5): mount failed [ 420.731411][T23151] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 420.826698][T23167] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 420.845383][T23167] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 420.857046][T23167] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 420.871195][T23167] EXT4-fs (loop5): mount failed [ 420.880068][T23166] EXT4-fs (loop4): unsupported descriptor size 0 09:22:15 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x2b, 0x800000003, 0xd60) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r6, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) bind$xdp(r3, &(0x7f0000000080)={0x2c, 0x4, 0x0, 0x6, r3}, 0x10) 09:22:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x4000000000000000) 09:22:15 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x10000005}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x0, &(0x7f0000000200), 0x80000, &(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRES32]) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0xa) splice(r2, 0x0, r3, 0x0, 0x800000ffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$netlink(0x10, 0x3, 0xa) splice(r4, 0x0, r5, 0x0, 0x800000ffff, 0x0) linkat(r2, &(0x7f0000000200)='./file0\x00', r4, &(0x7f0000000240)='./file0\x00', 0x400) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5452, &(0x7f0000000100)={0x11}) [ 421.274283][T23182] EXT4-fs (loop4): unsupported descriptor size 0 [ 421.282711][T23183] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 421.321429][T23187] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 421.339946][T23187] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 421.351128][T23187] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 421.365627][T23187] EXT4-fs (loop5): mount failed 09:22:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8bffffff00000000) 09:22:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 421.481593][T23208] EXT4-fs (loop4): unsupported descriptor size 0 [ 421.507046][T23210] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 421.530994][T23210] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 421.542442][T23210] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 421.566216][T23210] EXT4-fs (loop5): mount failed [ 421.567451][T23214] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 421.581099][T23220] EXT4-fs (loop4): unsupported descriptor size 0 09:22:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 421.672161][T23224] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 421.691813][T23224] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 421.704540][T23224] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 421.719167][T23228] EXT4-fs (loop4): unsupported descriptor size 0 [ 421.720258][T23224] EXT4-fs (loop5): mount failed 09:22:16 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x2b, 0x800000003, 0xd60) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r6, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) 09:22:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8cffffff00000000) 09:22:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) prctl$PR_CAPBSET_DROP(0x18, 0x1d) 09:22:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:16 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x545d, &(0x7f0000000100)={0x11}) [ 422.201418][T23246] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 422.205126][T23244] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 422.220869][T23249] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 422.239247][T23247] EXT4-fs (loop4): unsupported descriptor size 0 09:22:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xe4ffffff00000000) 09:22:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000080)="280000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5fc655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03e9ae30d3e0d3ff5089e4c090d447849a753da7706a2a8cc0e1fa0f5f125c774f16d8c5c4d024430800d4f570af37baed132821a2f0ce3fcef6a66fc0916eb52539534a26a5a6cfe845afb57bfafd926503ae3f749e66a7ecfa9635037d5635187e1af8ed290f18b3f2722454d83f834c9a391856d74c664e6f5ae5a85bc378ef8a265dda66fcd78d06e3e2f19869e95ac30bcaf6fe72eb7f18197efbde00"/171, 0xab, 0x640}, {&(0x7f0000000140)="020000000300000004020000315a0f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x1}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000480)="111fffd901000000803a0900803a0d0600000000065937779e5642a10a701d0bce934b37ddbd55aa9d02c9be88d40628a854e7a0102a2700b5c04621d6e9255260a990472cf67ba58d292589614ef1864bd0b1a752e66cd58004df4c72ba1585f22c488de19713df07fc4f84b8635b320e1da36a254a340f66e813d7f9563dbfe4479b088d34c5be8becbd7d5c5cf504ce80a3ca4cdef49d59c1076022bb9ad55cfede16c18b788d74d9392cf0da583ae41c8692bf0000000000000000000000000000006eb548fcc0f3363ce33f40ac0cf97efad47dba3cf8c2dc53651b8bca538c4e694d03bddaab09b2e505113a7bd2d5ce5368aa3c9d565aa3d6272050d5e992422b559a0e369df9b86d68cf05b9f6dbec0bf4388f8b4fe36f50ac7a81e5fb944b796fac7e6d684a78e32e598c0662a0791501c3403a6956c3910f1fa24596bc5bfb0298fff2e9d5ea39bd835a3eed30df3980ce9a27292699efd1ddb5ae38c991a993115b79cc1017d55b11d278c20f420ab6718900"/391, 0x187, 0x30000}], 0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000840)={&(0x7f0000000780)={0x84, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x10000}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x5}}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000800}, 0x810) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000006c0)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000380)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042bbd7000fcdbdf25020000000400d10005003e000400000008000c014000000005005900200000000400d100"], 0x34}, 0x1, 0x0, 0x0, 0x1c0}, 0x4010) 09:22:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 422.245178][T23249] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 422.257074][T23249] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 422.286254][T23249] EXT4-fs (loop5): mount failed 09:22:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 422.466859][T23270] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 422.476941][T23280] EXT4-fs (loop4): unsupported descriptor size 0 [ 422.479863][T23279] EXT4-fs (loop0): Unrecognized mount option "18446744073709551615" or missing value 09:22:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xf6ffffff00000000) [ 422.509243][T23281] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 422.528664][T23281] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 422.540010][T23281] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 422.554670][T23281] EXT4-fs (loop5): mount failed [ 422.659596][T23288] EXT4-fs (loop4): unsupported descriptor size 0 [ 422.755465][T23294] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:17 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x2b, 0x800000003, 0xd60) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r6, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 09:22:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfd3f020000000000) 09:22:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5460, &(0x7f0000000100)={0x11}) 09:22:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 423.041211][T23305] EXT4-fs (loop4): unsupported descriptor size 0 [ 423.062957][T23306] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfeffffff00000000) [ 423.082531][T23310] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 423.102187][T23310] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 423.131117][T23310] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 423.146302][T23325] EXT4-fs (loop4): unsupported descriptor size 0 [ 423.154412][T23310] EXT4-fs (loop5): mount failed 09:22:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x64840) 09:22:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 423.306990][T23331] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 423.317897][T23335] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 423.336443][T23336] EXT4-fs (loop4): unsupported descriptor size 0 [ 423.340782][T23344] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 09:22:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff01000000000000) [ 423.349377][T23335] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 423.362806][T23335] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 423.377266][T23335] EXT4-fs (loop5): mount failed [ 423.544799][T23352] EXT4-fs (loop4): unsupported descriptor size 0 [ 423.553228][T23357] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) r0 = socket(0x18, 0x5, 0x100) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x5, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000090}, 0x240480c1) getsockname(r0, &(0x7f00000007c0)=@l2={0x1f, 0x0, @none}, &(0x7f0000000840)=0x80) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x80000, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) setsockopt$packet_int(r3, 0x107, 0x13, &(0x7f0000000140)=0x2, 0x4) unlinkat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:18 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x2b, 0x800000003, 0xd60) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32=r6, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 423.857786][T23368] EXT4-fs error (device loop5): ext4_ext_check_inode:498: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 423.875999][T23369] EXT4-fs (loop4): unsupported descriptor size 0 [ 423.879664][T23374] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 423.893094][T23368] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 09:22:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x40049409, &(0x7f0000000100)={0x11}) 09:22:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff0f000000000000) 09:22:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 423.942768][T23368] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 423.959015][T23368] EXT4-fs (loop5): mount failed 09:22:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffffff00000000) [ 424.018679][T23389] EXT4-fs (loop4): unsupported descriptor size 0 [ 424.026966][T23390] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 424.139208][T23402] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 424.153032][T23407] EXT4-fs (loop4): unsupported descriptor size 0 [ 424.159838][T23402] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 424.174469][T23402] EXT4-fs (loop5): mount failed [ 424.176806][T23411] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 424.313686][T23421] EXT4-fs (loop4): unsupported descriptor size 0 [ 424.322659][T23419] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 424.333791][T23419] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 424.351113][T23419] EXT4-fs (loop5): mount failed 09:22:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x100000000640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="808100ff0f000000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000089b7e600000000000200", 0x3d, 0x100000000}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c00000010000100000000000000030000000000030000000000b786af12bd0228868f93a4fd167191a40e9e69be9e126fbd98c87b44a9bccf4a8ce8c9c9221e7f0836d7e6de786e1f94630100000000000000f4cd99b54093fb8b4bcbfa0bf981ccf837fcfbc2c0421b188dbf17c99f0d1748b68390e56ecbfae53587ccca1943589314c469c332edf7cf3d038eb70069278247de26d984f347f341b63b98d3857792083b089b8d0811a1d41aaa189b922e222bb9e1ef46d2b630524ab370"], 0x1c}}, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') 09:22:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x24a1c0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000080)) 09:22:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:19 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x2b, 0x800000003, 0xd60) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 424.736904][T23431] EXT4-fs (loop4): unsupported descriptor size 0 [ 424.790143][T23432] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 424.802230][T23441] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 09:22:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x40086602, &(0x7f0000000100)={0x11}) 09:22:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:19 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000040)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000002c0)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) 09:22:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:cgroup_t:s0\x00', 0x1e, 0x2) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 424.951210][T23462] EXT4-fs (loop4): unsupported descriptor size 0 [ 424.960954][T23455] EXT4-fs error (device loop5): ext4_quota_enable:5994: comm syz-executor.5: Bad quota inode # 3 [ 424.972564][T23455] EXT4-fs warning (device loop5): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 424.975950][T23463] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 424.987507][T23455] EXT4-fs (loop5): mount failed 09:22:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) recvmmsg(0xffffffffffffffff, &(0x7f0000003a00)=[{{&(0x7f0000000080)=@generic, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/161, 0xa1}, {&(0x7f0000000400)=""/170, 0xaa}, {&(0x7f00000004c0)=""/161, 0xa1}, {&(0x7f0000000580)=""/115, 0x73}], 0x5, &(0x7f0000000140)=""/60, 0x3c}, 0x4}, {{&(0x7f0000000680)=@phonet, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000700)=""/72, 0x48}, {&(0x7f0000000780)=""/83, 0x53}, {&(0x7f0000000800)=""/187, 0xbb}, {&(0x7f00000008c0)=""/28, 0x1c}, {&(0x7f0000000900)=""/142, 0x8e}], 0x5, &(0x7f0000000a40)=""/50, 0x32}, 0x4}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000a80)=""/74, 0x4a}, {&(0x7f0000000b00)=""/69, 0x45}, {&(0x7f0000000b80)=""/17, 0x11}, {&(0x7f0000000bc0)=""/6, 0x6}, {&(0x7f0000000c00)=""/24, 0x18}, {&(0x7f0000000c40)=""/191, 0xbf}, {&(0x7f0000000d00)=""/186, 0xba}, {&(0x7f0000000dc0)=""/197, 0xc5}, {&(0x7f0000000ec0)=""/74, 0x4a}], 0x9, &(0x7f0000001000)=""/124, 0x7c}, 0x30}, {{&(0x7f0000001080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001200)=[{&(0x7f0000001100)=""/248, 0xf8}], 0x1, &(0x7f0000001240)=""/78, 0x4e}, 0x20}, {{&(0x7f0000001300)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, &(0x7f0000002440)=[{&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/168, 0xa8}, {0xfffffffffffffffd}], 0x3, &(0x7f0000002480)=""/6, 0x6}, 0x1}, {{&(0x7f00000024c0)=@rc, 0x80, &(0x7f0000003980)=[{&(0x7f0000002540)=""/230, 0xe6}, {&(0x7f0000002640)=""/36, 0x24}, {&(0x7f0000002680)=""/225, 0xe1}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/145, 0x91}, {&(0x7f0000003840)=""/122, 0x7a}, {&(0x7f00000038c0)=""/171, 0xab}], 0x7}, 0x6}], 0x6, 0x2122, &(0x7f0000003b80)={0x77359400}) [ 425.046175][T23460] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 425.081854][T23478] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated 09:22:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 425.094360][T23478] EXT4-fs (loop5): get root inode failed [ 425.101048][T23478] EXT4-fs (loop5): mount failed [ 425.110160][T23482] EXT4-fs (loop4): unsupported descriptor size 0 [ 425.143640][T23485] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 09:22:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:19 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000002c0)=""/4096) [ 425.229309][T23489] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 425.247234][T23494] EXT4-fs (loop4): unsupported descriptor size 0 [ 425.253954][T23489] EXT4-fs (loop5): get root inode failed [ 425.260600][T23489] EXT4-fs (loop5): mount failed 09:22:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 425.415597][T23500] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 425.495823][T23508] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 425.508894][T23508] EXT4-fs (loop5): get root inode failed [ 425.514653][T23508] EXT4-fs (loop5): mount failed 09:22:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x40087602, &(0x7f0000000100)={0x11}) 09:22:20 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x2b, 0x800000003, 0xd60) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) writev(r1, &(0x7f0000000380)=[{&(0x7f00000002c0)="3a54df688c0153f19254baf1e5c6b635ad157582c1ddf889883b831973304e4f7e52e1a4b9dc5deee304865c5efa744f7108cd334601c2710985c89b16d6039f59417c18379089ced1b600028ce21ed8b7f1020d224fd248a6fb5eb0c660aef28a07d930ae55db32b4c639d8ba1e94ace2a5532b9e8579ff6ef95a4492dabc143568d767e34157fcd1b22cca388016d9a14db34e54f3070fb61f488be9776eef9e022b39e2512e768acace4ab1c8c5d1144d6945b711a8", 0xb7}, {&(0x7f0000000080)="b9e80369a24c82ddb3b7ff74ed04be003d8501aff45c11bed1cd8db6942acffc7e1a3eac6696096b245d045e5a94807d1a311650d6cb6ade9f72c9d107112f3dffccd448", 0x44}, {&(0x7f0000000140)="d0c8da304b4c121f32844fd1bf9e867616b5faf1edd41e4d04f57abf2293e0b87078e3a706bb55667517925e8170cd2d7c1877", 0x33}], 0x3) 09:22:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) dup(r0) 09:22:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 425.801818][T23519] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 425.817587][T23521] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 425.826666][T23526] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 425.840773][T23519] EXT4-fs (loop5): get root inode failed 09:22:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 425.852285][T23534] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 425.862374][T23519] EXT4-fs (loop5): mount failed [ 425.884018][T23540] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 09:22:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000a16f0cf3000002000019000000900100000f000000000000000200000006020000000008000095f14a8cacab6080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c20000fc048ea9ba53acfddb192e", 0x7a, 0x400}, {&(0x7f0000000080)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0xfc, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000340)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x4000c, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000040)='syz0\x00') lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) 09:22:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 426.003917][T23547] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 426.011371][T23549] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 426.024170][T23549] EXT4-fs (loop5): get root inode failed [ 426.030556][T23549] EXT4-fs (loop5): mount failed 09:22:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 426.102298][T23557] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 426.266426][T23564] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 426.278739][T23564] EXT4-fs (loop5): get root inode failed [ 426.284356][T23564] EXT4-fs (loop5): mount failed 09:22:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x4020940d, &(0x7f0000000100)={0x11}) 09:22:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x3) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r2, 0x0, 0x800000ffff, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000080)={'ip6_vti0\x00', 0x9}) r3 = signalfd4(r1, &(0x7f0000000180)={[0x800]}, 0x8, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000002c0)={0x5}, 0x4) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xa) 09:22:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:21 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) pread64(r0, &(0x7f0000000080)=""/65, 0x41, 0x8) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xac, 0x0, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_FEATURES_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}]}, 0xac}, 0x1, 0x0, 0x0, 0xc8d0}, 0x800) 09:22:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 426.696854][T23581] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 426.709883][T23582] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 426.717206][T23581] EXT4-fs (loop5): get root inode failed [ 426.724469][T23585] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 426.728287][T23581] EXT4-fs (loop5): mount failed [ 426.735618][T23587] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 09:22:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x1, r1}, {0x2, 0x4, 0xffffffffffffffff}], {0x4, 0x3}, [{0x8, 0x5}, {0x8, 0x5, 0xee00}, {0x8, 0xbcb4a71f515807e6}], {}, {0x20, 0x1}}, 0x4c, 0x6) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 426.860628][T23600] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 426.876503][T23608] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 426.895570][T23608] EXT4-fs (loop5): get root inode failed [ 426.901369][T23608] EXT4-fs (loop5): mount failed 09:22:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 426.946195][T23612] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 09:22:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 427.039705][T23615] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 427.053277][T23623] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 427.069198][T23626] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 427.075600][T23623] EXT4-fs (loop5): get root inode failed [ 427.083262][T23623] EXT4-fs (loop5): mount failed 09:22:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x80045432, &(0x7f0000000100)={0x11}) 09:22:22 executing program 0: sendmsg$NL80211_CMD_STOP_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa040}, 0x20008000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03997e25dd7b584cb759d602bd26e7d3bee7b6417747457102e057ed0cacfb1b0e58500099c178195d605ce973f2f21729048dd0900b5d0ca14fd57e53f4c867485515b5ce22bff8ed076134f7f0f7575bb2", 0x52, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) r0 = socket(0xa, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x11002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x2, 0x4e20}, 0x10) recvfrom$inet6(r0, 0x0, 0x0, 0x2043, 0x0, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x6) 09:22:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:22 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000080d5f4655fd5f4655f0100010053ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008008eded2c200001203", 0x66, 0xfff}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f000000000000010080000000100008000000001f0af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 427.592624][T23642] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 427.601497][T23643] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 427.617797][T23643] EXT4-fs (loop5): get root inode failed [ 427.623742][T23643] EXT4-fs (loop5): mount failed 09:22:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 427.717374][T23644] EXT4-fs error (device loop0): ext4_quota_enable:5992: comm syz-executor.0: inode #629053699: comm syz-executor.0: iget: illegal inode # [ 427.731925][T23644] EXT4-fs error (device loop0): ext4_quota_enable:5994: comm syz-executor.0: Bad quota inode # 629053699 [ 427.748904][T23644] EXT4-fs warning (device loop0): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 427.756356][T23650] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 427.771124][T23642] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 427.771637][T23644] EXT4-fs (loop0): mount failed 09:22:22 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = signalfd(r0, &(0x7f0000000080)={[0x1]}, 0x8) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x7, 0x4, 0xffff, 0x401}}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000180)=""/114) write$uinput_user_dev(r2, &(0x7f00000002c0)={'syz0\x00', {0x1ff, 0x8, 0xffdf, 0x5e}, 0x25, [0x200, 0x7, 0x3, 0x9, 0x7, 0x5, 0x9, 0x0, 0xe0a1, 0x8, 0x9, 0x1000, 0x1000, 0x8001, 0xb7, 0x8, 0x5, 0x2, 0x315, 0x2, 0x1, 0x0, 0x4, 0xfff, 0x2, 0x63443188, 0x7, 0x800, 0x7, 0x9, 0x100, 0x9, 0xffffffff, 0x3, 0x90, 0x3, 0x8, 0x5, 0x0, 0xfda6, 0x1, 0x2, 0x8, 0x800, 0x2, 0x7ff, 0x1, 0x7fffffff, 0x6, 0x5, 0xfa, 0x4, 0x5, 0x8, 0xfffffffe, 0x4, 0x102c, 0xa5, 0x401, 0x80000001, 0x6aed, 0x10001, 0x8001], [0x3ff, 0x2, 0x8, 0x0, 0x8001, 0x4, 0x401, 0x6, 0x3f, 0x5, 0x2, 0x7fff, 0x2, 0x9, 0x7, 0x8000, 0x2, 0x2, 0x800, 0x7f, 0x2, 0x5, 0x1, 0x101, 0x2, 0x1ff, 0x8, 0x8, 0x6, 0x6, 0x9, 0x1, 0x0, 0x10000, 0x7ff, 0x9861, 0x10000, 0x4, 0x3f, 0x2a, 0x1f, 0x1, 0x6, 0xbdf3, 0x1000, 0x3da2, 0x2, 0xfffffff8, 0xd5a, 0x8, 0x5, 0x0, 0x80000001, 0x3, 0xa02c, 0x6af, 0x2, 0x2, 0x3, 0x5, 0x80000000, 0x0, 0x4, 0x5], [0xfffffffc, 0x7c1, 0x3, 0x1, 0x200, 0xa2, 0x3, 0x8001, 0x0, 0x6, 0x6, 0x0, 0x8001, 0x8, 0x3, 0x7, 0x7, 0x7e, 0x9, 0x7, 0x1000, 0x40, 0x100, 0x4, 0x6, 0xe903, 0x2, 0x0, 0x100, 0x31, 0x400, 0x82, 0x3, 0xc5cb, 0x1f, 0xfc53, 0xff, 0x53cffdaf, 0xffffffff, 0x81, 0x4, 0x7f, 0x81, 0x401, 0x7, 0x100, 0x6, 0x101, 0x0, 0xecb, 0x5, 0x8, 0xa43, 0x2, 0x1, 0x7, 0x1, 0x2, 0x1, 0x80, 0x0, 0x54, 0x0, 0x1], [0x9, 0x80000000, 0x3f, 0x7, 0x4, 0x1, 0x80000001, 0x9f, 0x78, 0x3, 0x8b, 0x6, 0xfff, 0x0, 0x7, 0xc5, 0x20, 0x3, 0x5, 0xfffffffc, 0x5, 0x7f, 0x5, 0x1f, 0x800, 0x6182, 0x8, 0x8, 0xff, 0x5, 0x800, 0x8, 0x9e, 0x15, 0x1, 0x8185, 0x2, 0x10001, 0x2, 0x6, 0x7, 0xe2b, 0xf35, 0x9, 0x2, 0x8001, 0xbf, 0x7ff, 0x1000, 0xf18, 0x18800, 0x0, 0x8, 0x737e2f5d, 0x6, 0x800, 0x7f, 0xffffff41, 0x6, 0x3783, 0x3f, 0x2, 0x3, 0x3]}, 0x45c) 09:22:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000140), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) delete_module(&(0x7f0000000080)='trusted.overlay.origin\x00', 0x800) [ 427.854369][T23665] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 427.872165][T23665] EXT4-fs (loop5): get root inode failed [ 427.881971][T23665] EXT4-fs (loop5): mount failed 09:22:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 428.075096][T23673] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 428.084283][T23674] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 428.133685][T23682] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 428.214014][T23688] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 428.226215][T23690] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 428.232996][T23688] EXT4-fs (loop5): get root inode failed [ 428.239033][T23688] EXT4-fs (loop5): mount failed 09:22:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x80045440, &(0x7f0000000100)={0x11}) 09:22:23 executing program 3: ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000003c0)) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="b940f42e7c46765094a273b8e1e7c1ac74f110cce0be9011fe326a2ef74187ecc8c02cb9f4ee804136c80dcb1575b930eaa059c4e4102bf5d373a469344eb3c4bcd09d33a5c2a36aceabcdaa626f07ec6c879a80175549bf86f1d5250f3dce06694270f40749b244c13f271f8e5024e4beaafc7aba9b640872e4e502e98f0f0e8b8f989055c198290832d47879c96df206d949037ccc9ae1d6b510cb8cef9e1a6948c6560541d45c47fa69ce49169a99e0ad0d7c1fe36c32c275065f82cd961beed5337cbc9fff73f8975a26713adc95fb3c24bd658c3c4020cecccc6e4cdb00"/250, @ANYRES16, @ANYRES32=r2]) connect(0xffffffffffffffff, &(0x7f00000002c0)=@l2tp={0x2, 0x0, @local}, 0x80) exit_group(0xffffffff) splice(r1, &(0x7f0000000340)=0x9, r1, &(0x7f0000000380)=0xfffffffffffffff8, 0x73, 0xc) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x8f7d3cfaf11f48e3, 0x800) getsockopt$sock_buf(r3, 0x1, 0x3b, &(0x7f0000000200)=""/183, &(0x7f0000000000)=0xb7) 09:22:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:23 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 428.471621][T23710] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 428.480046][T23714] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 428.493819][T23710] EXT4-fs (loop5): get root inode failed [ 428.500145][T23710] EXT4-fs (loop5): mount failed 09:22:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 428.587994][T23725] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 09:22:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) sendto(0xffffffffffffffff, &(0x7f00000002c0)="e44705af0f33caae58f9100fc255e499ed5bc4134289312ea3c262a3ffdac2fc3863f8196c98c3a4250749bb1f1518daf4049ba3ebadead5d8ddd74c8c94655fa00e4faf97a01c87a48d21dae43880dd844efd4367987f6d87c19a178dd1f7736aac0faaa472a483c7db1055932ffc7ca20a5b481e88f0345a8543eb329a54b89ea0d2737e431a027923e460b0cf2af42dd8c400eb30b406c224df53dbabb4e51a50386f11eb502e859863304d6c12a8c4750480e54e6585ff", 0xb9, 0x24000001, &(0x7f0000000080)=@rc={0x1f, @none, 0x6}, 0x80) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:23 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="6ffe000000000000000002000000140001"], 0x28}}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x110, r0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xb0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x64f86e9e, @ipv4={[], [], @local}, 0x1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x4, @remote, 0x1f}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @remote, 0x80000000}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbcb6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8084}, 0x40) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 428.628731][T23723] EXT4-fs (loop4): invalid first ino: 0 09:22:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 428.689477][T23730] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 428.702659][T23730] EXT4-fs (loop5): get root inode failed [ 428.707106][T23736] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 428.718733][T23730] EXT4-fs (loop5): mount failed [ 428.727184][T23738] EXT4-fs (loop4): invalid first ino: 0 09:22:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 428.874490][T23736] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 428.907270][T23748] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 428.928315][T23754] EXT4-fs (loop4): invalid first ino: 0 [ 429.069404][T23755] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 429.084877][T23755] EXT4-fs (loop5): get root inode failed [ 429.091582][T23755] EXT4-fs (loop5): mount failed 09:22:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x80086601, &(0x7f0000000100)={0x11}) 09:22:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000002c0), &(0x7f0000000300)=0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = getpgrp(0x0) ptrace(0x4208, r1) 09:22:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f00000002c0)={0x1, 'veth1_to_bond\x00', {}, 0x1}) ioctl$HIDIOCSUSAGE(r1, 0x4018480c, &(0x7f00000000c0)={0x3, 0x1, 0x1000, 0x74e6, 0x101, 0x1d}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') 09:22:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:23 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) socket$inet6(0xa, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 429.351370][T23776] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 429.365241][T23783] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 429.366768][T23775] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 429.381807][T23783] EXT4-fs (loop5): get root inode failed [ 429.392018][T23783] EXT4-fs (loop5): mount failed [ 429.400212][T23782] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 09:22:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 429.506483][T23803] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 429.519536][T23803] EXT4-fs (loop5): get root inode failed [ 429.519722][T23805] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 429.525568][T23803] EXT4-fs (loop5): mount failed 09:22:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 429.612470][T23811] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 429.625121][T23811] EXT4-fs (loop5): get root inode failed [ 429.630924][T23811] EXT4-fs (loop5): mount failed [ 429.638557][T23815] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 09:22:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 429.765587][T23825] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 429.775820][T23822] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 429.782361][T23822] EXT4-fs (loop5): mount failed 09:22:24 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x80087601, &(0x7f0000000100)={0x11}) 09:22:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 09:22:24 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f00000000c0)) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 430.280649][T23836] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 430.290352][T23840] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 430.305885][T23835] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 430.322070][T23852] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 09:22:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000001580)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000200)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x3c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000001400)="bc4e339e13dd8bb720c7fde7ec189b1044c0104cfa834272c76770bc862af38a6e53fe7f1c2cd38cb214bc633cd98888a96e353269ac56ded7d22d94e14a2060280e7c902e6e2317fdb813a7d2c4bdd73fb3c8bc447317f42959d4540c687971eed8c7036f22a425ca3e78ba8801fa37655381a11ad496f61d96c9786441a53f76d67aef0d31473403abe0269532143a27f9ea266786dc5544eb824ff64bf796ddcbb597c73a198470c6ca9927291058d5112ba4b11fd77c702099f9c9b74b3652982df75fc8b29950ac3560c6c8177726638a91f8da9568ed48d15d291b43395c6d102afeb283fa11db29", 0xeb, 0x2}, {&(0x7f0000001500)="dced1c71f5426f23fea34c9789ea94afc8e19f9faf19ef8fab37f2725f8c66ae6184673bf2a3", 0x26, 0x4}, {&(0x7f0000001540)="a7c299e2e7199bd89866447795d56c6d0dca04c06eb111ca0df59633f8ff076cfe033a25a0afeba3fca9", 0x2a, 0x3}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=0x1024) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) syz_io_uring_setup(0x76d1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_CLOSE={0x13, 0xc, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) epoll_create1(0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) syz_io_uring_setup(0x76d1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000080)=@IORING_OP_CLOSE={0x13, 0xc}, 0x0) r8 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x5, 0x290740) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) r10 = socket$inet6(0xa, 0x3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r11, &(0x7f0000000000)=ANY=[], 0xfffffd88) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000001380)) syz_io_uring_submit(r3, r7, &(0x7f0000001340)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000001300)=[r8, r9, r10, r0, r11, r0, r0], 0x7, 0x0, 0x1, {0x0, r12}}, 0x1) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 430.355064][T23835] EXT4-fs (loop5): mount failed 09:22:25 executing program 0: ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f00000002c0)) 09:22:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 430.539118][T23861] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 430.548148][T23875] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 430.570526][T23878] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 430.576521][T23874] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 430.586338][T23874] EXT4-fs (loop5): mount failed 09:22:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000080)) r2 = dup(r1) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000380)=0x2, 0x4) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x100, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x884) [ 430.634214][T23888] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 430.841134][T23892] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 09:22:25 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0xc0045878, &(0x7f0000000100)={0x11}) 09:22:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:25 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x8482, 0x88) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 431.220708][T23909] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 431.230696][T23906] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 431.243747][T23906] EXT4-fs (loop5): get root inode failed [ 431.249463][T23906] EXT4-fs (loop5): mount failed 09:22:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 431.369830][T23916] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 431.383310][T23920] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 431.397933][T23920] EXT4-fs (loop5): get root inode failed [ 431.403923][T23920] EXT4-fs (loop5): mount failed [ 431.404810][T23921] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:26 executing program 3: ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000480)={0x7, 0x1fa, 0x3}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401, 0x7, &(0x7f0000000200)=[{&(0x7f0000000340)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f465cf000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x21000, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.ima\x00', &(0x7f0000000440)=@v2={0x5, 0x0, 0x80, 0x5949, 0x1, "f7"}, 0xa, 0x3) open$dir(&(0x7f0000000040)='./file0\x00', 0x20e00, 0x26) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f0000000140)={&(0x7f0000000080), &(0x7f00000002c0)=""/83, 0x53}) 09:22:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 431.488359][T23932] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 09:22:26 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f0000000080)) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 431.627535][T23934] EXT4-fs error (device loop5): ext4_fill_super:4591: inode #2: comm syz-executor.5: iget: root inode unallocated [ 431.639913][T23934] EXT4-fs (loop5): get root inode failed [ 431.647252][T23934] EXT4-fs (loop5): mount failed [ 431.667446][T23941] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 431.828626][T23949] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 09:22:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0xc0045878, &(0x7f0000000100)={0x11}) 09:22:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8282146}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="800600d8", @ANYRES16=r0, @ANYBLOB="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"], 0x680}, 0x1, 0x0, 0x0, 0x4010}, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa0, 0x5, &(0x7f0000000700)=[{&(0x7f0000000200)="4a8ee157f5fe769427f0fd8d6f04cb157333cff338a33e24a355c49f4644b046d740d821ebbcbc7422dab6225bf83b94402b9729e7c5c4b03311bc3173a32273948821823c5b3ba73556028d032ff649f8d5f69ce5ac1433bac995393828d9f4cccc7b2a200db2f47d01b92ca92d57b0c64f43302d855cb511831dde", 0x7c, 0x6}, {&(0x7f00000008c0)="f5ecc0b8e29bb56067f750078c1a27ee982f499228223aabf1a3037ff1ef2fcbc501481a7b36572c565557c2a2dce84d286ea300d8cb8956558f3bad4b8b76242d9a71e1e23f17c09f2e63480b365da044ebd67af85aecc04a9a59fc0d2c8e65f71371a2176060f7a24a50e644306871822cac4200b966da41fba5e460f1855c083e3a0a24eec1f3ad4d9da8aa43561009514ca01dcbd009f4ee537146bf4597b59bdba574307fcc32287cd1a370a05dfb5440595b455fff67a4a254398779813fc5230e7ded10bbe8393003e0a38cee39f043643d20cd1eea14c623aba9e44100d2ad97bfe0d6470c2835b18c388bc594fb499333fb45eec37bdb1125b7d0d2bbc1d54acb8588c2faffffff27c477e85147d5c0fae6ac8db200a73e6a53ba2ed4d7ae2e17416a49d3000000bcd46c304533c49ef8f5c6bd37e493997dca8d15c015b44ee92a2353e0c4538399021390696a2e6e4d1bf448e7fc92a0f5c2f255cf4d0f0998a6", 0x166, 0xffffffff}, {&(0x7f0000000340)="d668c818e8ca92509cad66181bf4501a44f0997aecc8fd184ac9e79eef5316c0e6100c931a45e8cd40436cb4ff9eae337a7d178c11f10533f00290a3546f478a9732a956d3f4298726048a3cfccbe7c1d64f9e3bc60433caf9d6d6e08e77d1e735931143eb706342e8997107e6b974e8bd358526fc09746f387ce2d4edd9cf617f2418e16383279d0e964bef1fceb02a982212b492a44b04fe953b6e0e98f36db2c7bcfdf14fe55b516b42", 0xab, 0xe0}, {&(0x7f0000000580)="9844019dba9772b3f13ee9a851afeeaa06ea2c48f266fa33975eaa90e4406054dbf9ffbc260710293250b0474d1a11226fdd1b2b24bc16f43047f298aac61be74f25df63a6721861fc79e56986a77fc1abfe450c5c7bd3b3662c085e935bbba145253db4291c0b6eced64a3ce5e13309c3371abd0be49e8d191e7869322a117e7e3ac2335b219a61", 0x88, 0xb2}, {&(0x7f0000000640)="dc067866bff6c8479294ebdf5cd2f09b833a01c7fe2576f8b8400a9c8c72f934029873f59000bda6532804f9f1c585e70de4f7cb0a1cae622260aa3ebfc38956f3526c442e19c881020d8a2b155d51093c78f46a89c06bfdd1c32d2b514ebbe1ea54125342c569f36b4e05f0d0a5f807ec85b4a9ed612e88a9e3bf3ccb59c6c99fd11cc3a930a2fc84670be2fda191ae", 0x90, 0x4}], 0x20004, &(0x7f0000014a00)=ANY=[]) open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x106) getxattr(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=@random={'btrfs.', 'ext4\x00'}, &(0x7f0000000500)=""/83, 0x53) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) rename(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0\x00') 09:22:26 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 432.097255][T23966] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 432.107092][T23966] EXT4-fs (loop5): group descriptors corrupted! [ 432.115772][T23972] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 09:22:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000300)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0xfffffffffffffed3, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4de}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000140)="02000000030000000400050019000f000300040000000000000000000f002e691674b7df3112381f0b", 0x75, 0xffffffffffffffff}, {&(0x7f00000002c0)="ed410000000ffd00d4f4650080000000150000000000000004198c03364600a8039c19", 0x23, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000080)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x1200004, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 432.166693][T23974] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:26 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 432.324914][T23989] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 09:22:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 432.403089][T23994] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 432.421810][T23990] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 432.422824][T23995] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 432.428778][T23994] EXT4-fs (loop5): group descriptors corrupted! 09:22:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socket$inet_tcp(0x2, 0x1, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 432.485779][T23989] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 432.612576][T24006] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 432.724222][T24011] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 09:22:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0xc0189436, &(0x7f0000000100)={0x11}) 09:22:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) openat$cgroup_freezer_state(r3, &(0x7f0000000340)='freezer.state\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000300)=0x4) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) 09:22:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0xa) splice(r2, 0x0, r3, 0x0, 0x800000ffff, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0xa, 0x0, 0x4}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x20000010) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$netlink(0x10, 0x3, 0xa) splice(r4, 0x0, r5, 0x0, 0x800000ffff, 0x0) sendto$inet6(r4, &(0x7f00000002c0)="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", 0x1000, 0x90, 0x0, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x2, 0x7, 0x3d96, 0x6472, 0x2}}) 09:22:27 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 432.974388][T24028] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 432.984341][T24028] EXT4-fs (loop5): group descriptors corrupted! [ 432.990573][T24035] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 09:22:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 433.101122][T24045] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 433.111541][T24045] EXT4-fs (loop5): group descriptors corrupted! 09:22:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 433.229056][T24058] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 433.240471][T24058] EXT4-fs (loop5): group descriptors corrupted! [ 433.414092][T24068] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 433.423900][T24068] EXT4-fs (loop5): group descriptors corrupted! 09:22:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0xc020660b, &(0x7f0000000100)={0x11}) 09:22:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(0x0, 0xffffffffffffffff, 0xee01) 09:22:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:28 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) unshare(0x40000000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:28 executing program 3: socket$nl_sock_diag(0x10, 0x3, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1ffffd, 0x7, &(0x7f0000000200)=[{&(0x7f0000000340)="200000000002000100000f000000000000000200000006000000000018000080000020000000d5f4655fd5f4655f0100ffff53ef000000000000000001000000000000000b00000000040000d2c200001203000000000080000000000000000000e2b27aecae64e010daecb51bddeb7b8e5673041a6fe2072e943e4d62681c44627b30331351e0abbf3d9c7c94cd271dc3a4788545959fe7e26dfda83f257502cb6849c41240501f4c31755a2cbaebf8a3bb7840898da4634bbfa35a91696f0e5002b2fdfb5438", 0xc7, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x8}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x5}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') 09:22:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(0x0, 0xffffffffffffffff, 0xee01) 09:22:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 433.870296][T24079] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 433.886269][T24079] EXT4-fs (loop5): group descriptors corrupted! 09:22:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 433.985204][T24094] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 09:22:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="49929472c30000efc1cf932f7700000000000000", 0x14, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x400000, 0xac) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000140)={0x2, 0x1ff, 0xd8}) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(0x0, 0xffffffffffffffff, 0xee01) 09:22:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 434.085603][T24094] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 434.098078][T24107] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 434.108472][T24107] EXT4-fs (loop5): group descriptors corrupted! [ 434.278889][T24123] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 434.290938][T24123] EXT4-fs (loop5): group descriptors corrupted! [ 434.309440][T24118] EXT4-fs error (device loop0): ext4_quota_enable:5992: comm syz-executor.0: inode #1922339401: comm syz-executor.0: iget: illegal inode # [ 434.325182][T24118] EXT4-fs error (device loop0): ext4_quota_enable:5994: comm syz-executor.0: Bad quota inode # 1922339401 [ 434.339172][T24118] EXT4-fs warning (device loop0): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 434.353592][T24118] EXT4-fs (loop0): mount failed [ 434.514412][T24118] EXT4-fs error (device loop0): ext4_quota_enable:5992: comm syz-executor.0: inode #1922339401: comm syz-executor.0: iget: illegal inode # [ 434.532776][T24118] EXT4-fs error (device loop0): ext4_quota_enable:5994: comm syz-executor.0: Bad quota inode # 1922339401 [ 434.545052][T24118] EXT4-fs warning (device loop0): ext4_enable_quotas:6034: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 434.559686][T24118] EXT4-fs (loop0): mount failed 09:22:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11}) 09:22:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x47, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x2000640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES32, @ANYBLOB="d7572d26e10409536a330d63ad04d97d840ad983f6f53a662dabeffa39415651ad9f7cc5316055da13228cceb85ddda158ba299953e26d97", @ANYRESHEX=0x0]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:29 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) unshare(0x40000000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 434.738126][T24144] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 434.750032][T24144] EXT4-fs (loop5): group descriptors corrupted! [ 434.756426][T24145] EXT4-fs (loop3): Unrecognized mount option "ÿÿÿÿ0000" or missing value [ 434.778609][T24150] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 09:22:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x3) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r2, 0x0, 0x800000ffff, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000080)={'ip6_vti0\x00', 0x9}) r3 = signalfd4(r1, &(0x7f0000000180)={[0x800]}, 0x8, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000002c0)={0x5}, 0x4) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xa) 09:22:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) syz_usb_connect$cdc_ncm(0x2, 0x8f, &(0x7f00000002c0)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0xff, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7d, 0x2, 0x1, 0x57, 0xa0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x9, 0x24, 0x6, 0x0, 0x1, "933d32d2"}, {0x5, 0x24, 0x0, 0x81}, {0xd, 0x24, 0xf, 0x1, 0x8001, 0x9, 0xe7, 0x6}, {0x6, 0x24, 0x1a, 0x9, 0x6}, [@mbim={0xc, 0x24, 0x1b, 0x0, 0x2, 0x5, 0x1, 0x8, 0x3}, @call_mgmt={0x5}, @obex={0x5}, @dmm={0x7, 0x24, 0x14, 0x6, 0x3}]}, {{0x9, 0x5, 0x81, 0x3, 0x93ffe62bebc97e87, 0x80, 0x9, 0x1}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200, 0x63, 0x9c, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x20, 0x20, 0x9}}}}}}}]}}, &(0x7f0000000140)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x9, 0xbe, 0x1, 0x20, 0x40}, 0x16, &(0x7f0000000080)={0x5, 0xf, 0x16, 0x3, [@ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0x4, 0x10, 0xc2, 0x1c, 0x14, 0xff}, @ptm_cap={0x3}]}, 0x1, [{0x41, &(0x7f0000000380)=@string={0x41, 0x3, "9166fe660108478989e1a689e6b95990e1e011c2c1eb079bb6c9d92ad03d6cc360320de38f1c26bb3a582d1f6594d2eaab5d06e938021a11eb2c0fe5ba7fa9"}}]}) mkdir(&(0x7f0000000440)='./file1\x00', 0x140) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 434.918157][T24166] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 434.929039][T24166] EXT4-fs (loop5): group descriptors corrupted! [ 434.932395][T24168] EXT4-fs (loop4): invalid first ino: 0 09:22:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 435.107837][T24186] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 435.117091][T24186] EXT4-fs (loop5): group descriptors corrupted! [ 435.374425][ T111] usb 4-1: new full-speed USB device number 7 using dummy_hcd 09:22:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x2}) 09:22:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:30 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) unshare(0x40000000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 435.614409][ T111] usb 4-1: Invalid ep0 maxpacket: 512 [ 435.627231][T24198] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 435.638041][T24198] EXT4-fs (loop5): group descriptors corrupted! 09:22:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd511665f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000004d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x643}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x244800, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "075aeac91e68d2f8ba4014"}, 0xc, 0x2) r0 = getuid() lchown(&(0x7f0000000040)='./file0\x00', r0, 0xee01) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f00000002c0)=""/162) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$int_in(r1, 0x5421, &(0x7f0000000380)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000800)={0x0, 0x0, 0x18, 0x2, 0x1ad, &(0x7f0000000400)="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"}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000003c0)=0xf03) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setreuid(r0, r3) [ 435.719738][T24211] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 435.730124][T24211] EXT4-fs (loop5): group descriptors corrupted! 09:22:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 435.764441][ T111] usb 4-1: new full-speed USB device number 8 using dummy_hcd 09:22:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11}) 09:22:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 435.926297][T24219] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 435.944820][T24219] EXT4-fs (loop5): group descriptors corrupted! [ 436.004422][ T111] usb 4-1: Invalid ep0 maxpacket: 512 [ 436.011160][ T111] usb usb4-port1: attempt power cycle [ 436.027582][T24229] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 436.044416][T24229] EXT4-fs (loop5): group descriptors corrupted! 09:22:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 436.147510][T24234] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 436.167787][T24234] EXT4-fs (loop5): group descriptors corrupted! [ 436.744364][ T111] usb 4-1: new full-speed USB device number 9 using dummy_hcd [ 436.834397][ T111] usb 4-1: Invalid ep0 maxpacket: 512 [ 437.004295][ T111] usb 4-1: new full-speed USB device number 10 using dummy_hcd [ 437.114356][ T111] usb 4-1: Invalid ep0 maxpacket: 512 [ 437.119814][ T111] usb usb4-port1: unable to enumerate USB device 09:22:32 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x3}) 09:22:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x8) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, &(0x7f0000000200), 0x3028, &(0x7f0000014a00)=ANY=[]) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/7, 0x7) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@remote, 0xffff109f, 0x1, 0x2, 0x4, 0x2, 0x9}, 0x20) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000200)={0x9, 0x7, 0x5, 0x0, 0x8, "2087abbfea6ccf45"}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff01000000000000) [ 438.169949][T24250] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 438.179297][T24250] EXT4-fs (loop5): group descriptors corrupted! 09:22:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x200000000000000) 09:22:32 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000002c0)=0x14) lchown(&(0x7f0000000040)='./file0\x00', r1, 0xee01) 09:22:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x80000000000000) [ 438.431873][T24273] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 438.463704][T24273] EXT4-fs (loop5): group descriptors corrupted! 09:22:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012abd7000fcdbdf2513000000080001007063690011000200303030303a00043a31941b3000000000080003000300000008000b000002000006001c0001800000ff0c4624dae7700034e6deef163e553d362b1d7e96ed5a5ba8df839c0928989f918da4ed08e06f3456c67684a7e601f095312fbc6a88193fee6207a5303c6c6617cea372b2b9fbe28a473823c12133459c43ae35cd64eccf82733a0e45eecab572337c8ec5594f7f"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x20000800) [ 438.600195][T24296] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 438.614594][T24296] EXT4-fs (loop5): group descriptors corrupted! 09:22:33 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x8}) 09:22:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 438.943725][T24309] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 438.961625][T24309] EXT4-fs (loop4): group descriptors corrupted! 09:22:33 executing program 3: getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="00fb7803faa0123506a20214821e5e9255d99c1626f5acbd7eb774e73df21a923e213040ef179fe3b1cf00bf93cf21060eaadabf6473efce2b5a88b5d6b04d2a8933590dd4831b3c0025c0c854d3d4db0a03feb1623b4ce247d4d952a5bae826e54de6fb65b3664c188ea91c3251f0b1d95623533be8648a"], 0x78, 0x3) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7) 09:22:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 09:22:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffff8b) 09:22:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:33 executing program 4 (fault-call:1 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 439.019072][T24315] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 439.030402][T24315] EXT4-fs (loop5): group descriptors corrupted! 09:22:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed45000000100000d4f4655fd5f4653ed5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000002c0)=""/4096) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@md5={0x1, "528ab59f78714aa533e46785aeadc370"}, 0x11, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) [ 439.186554][T24340] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 439.196456][T24340] EXT4-fs (loop5): group descriptors corrupted! [ 439.271963][T24354] FAULT_INJECTION: forcing a failure. [ 439.271963][T24354] name failslab, interval 1, probability 0, space 0, times 0 [ 439.284826][T24354] CPU: 0 PID: 24354 Comm: syz-executor.4 Not tainted 5.4.65-syzkaller-00175-g63d1c2f0b547 #0 [ 439.294956][T24354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.305098][T24354] Call Trace: [ 439.308378][T24354] dump_stack+0x1b0/0x21e [ 439.312693][T24354] ? devkmsg_release+0x11c/0x11c [ 439.317612][T24354] ? show_regs_print_info+0x12/0x12 [ 439.324789][T24354] ? proc_fail_nth_read+0x1c0/0x1c0 [ 439.329974][T24354] should_fail+0x6fb/0x860 [ 439.334371][T24354] ? setup_fault_attr+0x2b0/0x2b0 [ 439.339375][T24354] ? fsnotify+0x13a0/0x1460 [ 439.343861][T24354] ? getname_flags+0xb8/0x610 [ 439.348537][T24354] should_failslab+0x5/0x20 [ 439.353020][T24354] kmem_cache_alloc+0x36/0x250 [ 439.357766][T24354] getname_flags+0xb8/0x610 [ 439.362249][T24354] ? security_file_permission+0x128/0x300 [ 439.367948][T24354] user_path_at_empty+0x28/0x50 [ 439.372779][T24354] do_fchownat+0xe0/0x240 [ 439.377091][T24354] ? ksys_write+0x237/0x2a0 [ 439.381575][T24354] ? __ia32_sys_chmod+0x1b0/0x1b0 [ 439.386579][T24354] ? __ia32_sys_read+0x80/0x80 [ 439.391336][T24354] __x64_sys_lchown+0x81/0x90 [ 439.395995][T24354] do_syscall_64+0xcb/0x150 [ 439.400480][T24354] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 439.406349][T24354] RIP: 0033:0x45e179 [ 439.410227][T24354] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.429814][T24354] RSP: 002b:00007fce3f8cfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000005e [ 439.438228][T24354] RAX: ffffffffffffffda RBX: 00000000000203c0 RCX: 000000000045e179 [ 439.446182][T24354] RDX: 000000000000ee01 RSI: ffffffffffffffff RDI: 0000000020000040 [ 439.454486][T24354] RBP: 00007fce3f8cfca0 R08: 0000000000000000 R09: 0000000000000000 09:22:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000b68212c6040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) ftruncate(r0, 0x3) [ 439.467666][T24354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 439.475619][T24354] R13: 00007ffe98149dbf R14: 00007fce3f8d09c0 R15: 000000000118cff4 [ 439.494247][ T22] audit: type=1326 audit(1600939354.174:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24352 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 09:22:34 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 439.765522][T24367] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 439.775082][T24367] EXT4-fs (loop5): group descriptors corrupted! 09:22:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x300}) 09:22:34 executing program 4 (fault-call:1 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 439.907814][T24377] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 439.926897][T24377] EXT4-fs (loop5): group descriptors corrupted! [ 439.928772][T24379] FAULT_INJECTION: forcing a failure. [ 439.928772][T24379] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 439.947294][T24379] CPU: 0 PID: 24379 Comm: syz-executor.4 Not tainted 5.4.65-syzkaller-00175-g63d1c2f0b547 #0 [ 439.957445][T24379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.967514][T24379] Call Trace: [ 439.970797][T24379] dump_stack+0x1b0/0x21e [ 439.975118][T24379] ? devkmsg_release+0x11c/0x11c [ 439.980044][T24379] ? arch_stack_walk+0x98/0xe0 [ 439.984796][T24379] ? show_regs_print_info+0x12/0x12 [ 439.989986][T24379] should_fail+0x6fb/0x860 [ 439.994401][T24379] ? setup_fault_attr+0x2b0/0x2b0 [ 439.999409][T24379] ? kstrtouint_from_user+0x1cb/0x230 [ 440.004768][T24379] __alloc_pages_nodemask+0x1ee/0x7c0 [ 440.010120][T24379] ? __kasan_slab_free+0x168/0x220 [ 440.016694][T24379] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 440.022746][T24379] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 440.028272][T24379] ? proc_fail_nth_write+0x166/0x200 [ 440.033541][T24379] ? proc_fail_nth_read+0x1c0/0x1c0 [ 440.038723][T24379] alloc_slab_page+0x3a/0x390 [ 440.043387][T24379] ? proc_fail_nth_read+0x1c0/0x1c0 [ 440.048578][T24379] new_slab+0x97/0x450 [ 440.052637][T24379] ? should_fail+0x182/0x860 [ 440.057387][T24379] ___slab_alloc+0x2e0/0x450 [ 440.061963][T24379] ? getname_flags+0xb8/0x610 [ 440.066660][T24379] ? getname_flags+0xb8/0x610 [ 440.071323][T24379] kmem_cache_alloc+0x230/0x250 [ 440.076162][T24379] getname_flags+0xb8/0x610 [ 440.080829][T24379] ? security_file_permission+0x128/0x300 [ 440.086560][T24379] user_path_at_empty+0x28/0x50 [ 440.091397][T24379] do_fchownat+0xe0/0x240 [ 440.095731][T24379] ? ksys_write+0x237/0x2a0 [ 440.100219][T24379] ? __ia32_sys_chmod+0x1b0/0x1b0 [ 440.105226][T24379] ? __ia32_sys_read+0x80/0x80 [ 440.110083][T24379] __x64_sys_lchown+0x81/0x90 [ 440.114743][T24379] do_syscall_64+0xcb/0x150 [ 440.119234][T24379] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 440.125108][T24379] RIP: 0033:0x45e179 [ 440.128989][T24379] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.148578][T24379] RSP: 002b:00007fce3f8f0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000005e [ 440.156974][T24379] RAX: ffffffffffffffda RBX: 00000000000203c0 RCX: 000000000045e179 [ 440.160282][ T22] audit: type=1326 audit(1600939354.834:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24352 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 [ 440.164937][T24379] RDX: 000000000000ee01 RSI: ffffffffffffffff RDI: 0000000020000040 [ 440.164942][T24379] RBP: 00007fce3f8f0ca0 R08: 0000000000000000 R09: 0000000000000000 09:22:34 executing program 4 (fault-call:1 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000012c0)=@sha1={0x1, "175cf792802aa4730e340c4450025f624075969c"}, 0x15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) [ 440.164947][T24379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.164952][T24379] R13: 00007ffe98149dbf R14: 00007fce3f8f19c0 R15: 000000000118cf4c 09:22:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200cac9bcc5849a27fb000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x40000004400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 440.345211][T24387] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 440.358209][T24387] EXT4-fs (loop5): group descriptors corrupted! 09:22:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:35 executing program 0: unshare(0x44000600) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000200)={0xd, 0x20}) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) write(r1, &(0x7f0000000240)="9e5bd581d4465ea7f34e76334aeafe27b3705d73f4d007c985505be99a8a6150d0fa219f915683ba67dfc9f205ea0ff99cc9cf44437127ca0a576e4b7884ad825de2bd78a457122231870857dbdfcfc3d75cf263933cb20fe6d1ca8d9b74959e298885d773237732ecd6217f99a9315f84fe1a0b0f596610bccdc3aebfd4d6db675f9e02118d577b9a", 0x89) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d000000000000010000000000080004000000000000000000", @ANYRES32=r3, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2={0xff, 0x5}, 0xf179d20d76271f53, 0x0, 0x0, 0x200}}) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, &(0x7f0000000100)={0x1, 0x1, 0x1, 0x5, 0x2, 0x7}) 09:22:35 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x40000000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 440.594683][T24407] EXT4-fs (loop3): couldn't mount as ext2 due to feature incompatibilities [ 440.603848][T24408] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 440.632305][T24408] EXT4-fs (loop5): group descriptors corrupted! 09:22:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0xedf}) 09:22:35 executing program 4: sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a8aeda02", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf250500000005000200060000000800038004000100740303800800038004000180ac0003801c0001800a0002007d2f292d2d000000040003000400030004000300580001800800010005000000090002006578743400000000040003000400030008000100010000800a0002005b27252b5d000000040003000800010006000000090002006578743400000000090002006578743400000000340001800900020065787434000000000d0002003a2927255d402623000000000800010005000000080001002000000004000300c0000380200001800800010000000000080002002d2c5b000900020065787434000000002400018008000100040000000800010001000000040003000400030008000100000400002000018008000100ff0700000800010000000000090002006578743400000000100001800800010000040000040002001c0001800400030004000300080001000004000008000100ffffffff2c00018008000100ffffffff0400030004000300080001001f0000000400030004000300080001000600000008000200070000003c00038010000180040003000400030004000300100001800900020028232d2a0000000018000180090002006578743400000000080001000100008000010380100001800800010081000000040003004800018009000200657874340000000009000200657874340000000008000100fe00000016000200297b2d5b3a5e2a7b5eb27bf2282a405e290000000900020065787434000000003000018008000100cc0100000a0002002c402e5b2d000000060002002f000000090002006578743400000000040003000c00018008000100090000000800018004000300340001800a0002007d2f292d2d0000000900020065787434000000000800010001000000080002002d5e250008000100050000001800018004000300040003000500020000000000040003001400018008000100ee0600000800010001800000af00050063e00cc91dad22e722a62ecd838cf1df3b03f8bb6b842ee35f11d60e40f6b55769f5e1a9f6c215c8e255cedfbc69b5eebc1d8c1d669535129c213cda5f9c11ee5225b3d995f26fc4f60275843f74c0d5a942028290c4f9b18d394eba08a07d539a399a195c07c1980085cda7facdace1bae9d1a834167b74e7c8ce057618fa37d76d1d0ae64082d8a19906755fce4f61546d4489ed191ed3c10ccda288e1f75827dfa8ce12c68ed9b18b32000800020000800000"], 0x398}, 0x1, 0x0, 0x0, 0x2400c850}, 0x44001) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:35 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/24, 0x18}], 0x1) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) r1 = eventfd2(0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f00000000c0), 0x250ce47f) r3 = dup3(r2, r1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$netlink(0x10, 0x3, 0xa) splice(r5, 0x0, r6, 0x0, 0x800000ffff, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NETID(r8, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f00000009c0)={0x24, r7, 0x21, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r7, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44020}, 0x2) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x800000ffff, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x904}, 0x20048010) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000080)=0x22, 0x4) 09:22:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200008, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000140)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0xffffffffffffff9c) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x30, &(0x7f00000000c0)) tkill(r0, 0x9) ptrace$peeksig(0x4209, r0, &(0x7f0000000080)={0x4, 0x1, 0x2}, &(0x7f00000002c0)=[{}, {}]) [ 440.787857][T24424] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 440.799184][T24424] EXT4-fs (loop5): group descriptors corrupted! 09:22:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) move_mount(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x0) 09:22:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x14) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$CHAR_RAW_FLSBUF(r1, 0x1261, &(0x7f0000000340)=0x5) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f00000002c0)={&(0x7f0000000140)={0x30, r2, 0x800, 0x703d28, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8001}}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004181}, 0x4000) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 09:22:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 441.288118][T24407] EXT4-fs (loop3): couldn't mount as ext2 due to feature incompatibilities 09:22:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:36 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x40000000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x2000}) 09:22:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:36 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000000018105e04da0300000000000109022400010000000009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@ng={0x4, 0xc, 'z'}, 0x3, 0x2) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="002222000000ff92"], 0x0}, 0x0) 09:22:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000020000000600000000007e85e1b1000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)='\x00', 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0xdc, 0x2, &(0x7f0000000140)=[{&(0x7f00000002c0)="f14d4616f77c382f1ef6668a42b5e04ca1a02a4f2435c2c0b1dfcc08c8ff001d2f9b1a15809e714f0be553ddc9ec9fa3c3313ab644598b4a087f272a135f782f4b70221191433faca09dfbccd10565b1a9978a7d8f7065c6cfdcbe6d2d6f5195e2dec8a56a5452615c7221c734a647974d3f9d83b754030047c3d1be3313e454f224b6401000c264cf6be1e7701f69c4bedba1b3d0bc756dc03cf7307302d6a98194316ec69f3e15dcefe3f60c8dc606d6a32e37ba8b701127cc3d702ac939adc4016630cbfbda13f30166d1eb2cc5a789eeaa9e5b9c039ea79fee347004ed1acf03046d7398dbe9f8c0af605ca586f6d8b88ce06b64c520974811c0bf4c8a23f5cd6a05690e61b0c52f8649c560f8805bf6edc969b3fb8f07a881f3198ffd12150a19b849549018c1be7a6b5fde0634c9a0ea5c2dc761c6463aacc6b4fbdacdbbc01f8d0e6b690e83ede5b4138bb7419e748fce2161e654fedf8dd8cd60f1e40254025478d9f2dde90b7bea4c3a1e645974188d2d2765ebf06cbe4297e9f4cef962d7621592a43d2a04fe77375129a43fb5117e97cdb18224f5a29ddf0f9455b76da37fa6c547b54f2c53cd34af0d397d08ec139ddbb0832978056833d0fafa5653e9b696a689b3ce2d7355d4c9ce164672da8e9b09bdae59acdad6c5b794681b822313d52568e6c3c8f1b7cd4dd2c148cde365ac73c291b0779dfcda4ace973309bdb40d887b06b1dd035b441e0bdcd5c142a2713cda2508707eef7c91507e6e9bc78c539499a0b4a7d5a0da520d03e24696d6a95c5650feec333c615c645ddeb0c859d988588b95d2c89cb965a7cdaab1545aea39d5f9d646d400105247a98fe48b864b5990054a6469cf8daead93852da3268a3b9aa4bdb61344e94d584dff738a982c9e7671d0444a872f378db70034181cbba0ddadbc522e11d6b081751561c6a2c2d779521f1fc273a345c03dec41eb32f00c8b17910d9a803d8545f01845ad5768f03c0df54b40390f7a68473af3d7a10b99a7d177a0eca769b81dc03afcb3ea8f5d6e8c1a3b944af62f7b5343bc36f3cf4b922922baf965baa3f75455793caa05eb899e80946eaa89a150a43a614178407d99a3d3ee4e2d257ecbcfde3cf10e9d4c50cd266e416a1c4138da6d183a222956324140a3db46a5c86cdc07e6b40a6f85464f11ae4c8fe1e8533d166b9033be9ea8efd3a79387e843889d9a14b7bd694bea9a285c8f9a6008d2a2a07dadf43a46e897aecc57825e8bc0c29d9fe5ed7b1b535b6238217322ef8122edead0b7608d65bdab7d0aff83090448771fc1278724ae609aa107419c8ef11fe9a530e703a92c7731acf890d39429c392ee96640ce3e975220df7e6bb5be99f6430d2da7ecedb2d7ab48dd723034962aa1155ec33b0d6d2d5751723f9935d5d754b7b4bb740e09282bcd873598a8432c1e63cddb91601e25575882d14c8dd745d418dd985b56eb21786fca17b839ba7f72318d71fc93168d0464422f6f3951142b9cb8c175bfaaa7a00450721b1aa545d912b0f48913cf609325ba9947889b4aaeb4b607d3216f7c7aeaa27daaf7f8647d41f9ebc39a559cdd602d8a5f4205d5eddb728fa4470f20aa74c0b2bb187413e68090188d3e79d3e836d32d46b8fa30933758f4ad26c5148967483d0874d60d2b643aa40b819fb8f7319c3642bd7affacb7aab615c1e84a66ea21894e4388004752b7b4094ae76db9b7c863e8127aef03615209fa687a72b3651e13413a9e812eec9ff79f540ac71c43cbd0eb0bb4996c32e118c105d93240486eed37a0873bf3cee3d223192ffb1442f7bb819c87174ad192ce9452d93efeff6c5b25ab8f5b90b99f5cac2c364fd58bf0c1be4cbd59acfc42470c69aa808bceeaddb14b3d00ef5a35aea85e815e50e4a3b369c04ed109384fb5bdaba5fb00297154d8bccde2de795514b07d1978b355934c82b54bae8884c5f1c55dc78481b04275671c3ff9a50eb55744b1296614c11684d648bf559788a3257bb1427401aca12fa40489689bd3de51491217d009426556b24c563cb63e90248e8a8eca223fb0207ecc872c4b189e4f74bf746e1360803216786d9fdb26965c1292c5c42331edb11ff43c44dd524903cf202e9df4daa74d0b53696d3e3a6298ddfb2eb297cc3c0c713f9326957eab5353b71f7352c46237dc49af218ef24f2e64ea9c4aca9d40310e2dc5a5f0a11250fd3ba50a0e7d6b1209cf91d268ce517c4a5ef3d188b30e20f654675e7f0bbf8d44798701d20e0e7403971291c8a405b9aca176ad1be82a4c5bbcfc6d44c703e115dbd10d5392facde2a002a20bbc11a07bab9e81d88d6d4b763d24cde005f6c294dbdadbf8d3efb1beb8305b865dc03b06ff58c97a6533319f7b8e8868588d2c494b11d599bc45e8a83f5f382d41dbb172a89e92caabb0005ebab0d37ea02a63bee4276c3a5fba0f6274a264f7bd98428673d02ee2e4234b4a9a8c44107b3f139a8c66be0b065f347a0a24cf7c3646e63a8444a8053d07bfc1e16084d168de6e1a6db425f434027eb9ec2f3fee4034b1253c01766d744da07b6459e67446a658795c5855f293013843790cd91752bb0cc977ae587f1c80ac5c9850c0cef8b5f0d0452610255483f93caafdc391501480831dabd75a40fb36249ac30660ac8638c2dcac9af003a3bbd8d2c4473ee7959833ff0ac00cbfee2069720b935b9b18bddca1eb741dd94f2b883396c1ba224d032c4f6c66aad3a1a10cfbc91fb5bc0c7889884db9be2e18acf1ee5c97c0b80e4ad7ff46220f1b111e9576122da172669c2e9c2151e85de842c59a59395844a1efb18668b92c8cd5212ba26e5763bd04ecf3afe9e4e00968f99409e023ccc390bad4dd00786aac25f3390372b0a34a87900852544dfa6a93b9fc282e16c3618d6ce89927e665a464714b31186a488c8fa970a9aa24e6fda65418e8f4351d1aa2b8fb3f108b87e054112c8fbdda3b50668a2ce805933326699c0fb6058efb218183fc0f07cddc6150f528dfd183423cb3683792910e9bbc88c78fc3cc5208afdaeb236f1777384044a1d9ae88c4f8414892c3e909094d67c1f7e00b546461ad17530cc08374271c0a457fef9205dd79af818cb3513e74b957b5381f8d81c3cb65a91a00355991e86a7459fe5b915ec4a92416b8fc99b509d903bea8182de9b322d237bd1e09df45a96e7fea68393f5f0736cb9c62518d0c3e83e95c0df4a533e81bdc5c79545a233b08751292587c59ffea05e6b29a34a084de32983b90028f0c0a4896e52ee9ba7af274acfb9cc6edc54c411ff562362fb3d6f5fda60027e0df062d50d89d090a38f0fea52d04a04c3e3d3551ed1b81e714de2b415f3a107246910e71801ac03ad62b7d604ad6f7d99f9be1a034fbf1eed01ae1581fcfd376fde8a43918fe72e96cf43be9ba3098af0844378bb51a0a3978981ad6779017a34e020a72418825ce142e9040dc136d27ade79832e0a8c8bb0546f06db32365e1fa32af388aab8f6fef7c400b25fe2e4a043885c6ab356d459443571e358a88f46ced231188f949a33a4275ca3b63b8f260ff7423312bd32e61219216bc126b7c62338628031d253ebd3b8fa27bc3a0a1bc71a42a16378262c03cf6c1aa53108a94d7d94c18c1b545bf2a5444c5dd12691b2a9669f8cd7cd1fd309ccdd643e168cd86d2a9c911ef1b40df79644519cd3ccdd2b61735b89661f3dd0aeec8f9d84107031a45ca47b7b7da5dd1ae01f284a8124ee362bf7a7563f4c2439b770e488546883519869aa056502b4bf9c2685c53207e825e5dffec293d85ed201ed74b3b67f37358074cfa6e5aa517d8b0a2f07e3d7aea100574ae8f5a13d4a5cfd744eebba9f6aff0cd0a29a02e16d1f0f560294a31c53037266808377f400c5d2e9e093537a7ad3dd375b1e76de1efd32dcbc18730c62c2ac6611b9b2a5dca3ead10c0457dc007975847ed63e111242c898c1b0deee6d76677c68ce3e55b1d243f8f165ac671e983b81fece72a2b42630927c9beab80c5d5cdcb8e597dc27c72af90353b52e7b473c81316307d2af50715a2e8af9923450b462e2d9f3a3b8758fa5da558aa3f3f7b8febc17a78ef9d473543c82b0cf9ccdffef84c860ce61d4e147180a25ae5c881a934f056697f3f384dec1dd187983a7bccba542d4618f209fa593b695dcf5aeb66fa252a3c2b0a34cf138978ad45606399241f3c75f67712c125370f3bec7a2ad5af74bad7741f7cb7a0d48aad4a2b9bf2abea34918636a1c47c6e01fe7ade3eaa0fc50c63590a4cf5dd964d7cb36cc7481cfe4a0244697ffad119c391a307a44084753a3b6b29ed9bc4ceb7eda0a0a060034d24645ec457827b764dbd177172e5e7b5f933f0710b5279935ee08d2d1ef0fda4203e4860ccebfd84a6d1bd09cf2f60f5d0df380dd02b91f124bf7618e046f68447d283e7076292051c25b126623084db692edca74b099c0a16fcd44566fdf2bbfe613a89e067cfd89ff449028e9544a776da51abfa507d9cab48c4de960e7b2230e337558319b6b9a4a431515c6ad80b33a6aa6e0bc727170e1f65051371c8fdf2251ae4040d001a8c82e31fb82b410e6d1e24086997693775f2aeabe4a0399446fe72fb2dc54ce75ccfb6d0c63c48fc15808b589efe27acdc944cc8de2ad34d5ae99367d198213589c0c4caa9c1a667a361eaf50c60690e94bda1b87c52dfee891ed13af1227a8068ae8da16dba89b36b4b365fc9b7bbb5b802fd4e97dafe1f2549405daf995baecaf68dcb0094a2e512122e1b8e98ad84c57d0dd7c0203b0c102ea976baf0fbe77ef4b71d6128246a656906b070937daff4030d17ae38bd68c0b43c00d6da1ff6d098d6580d86dae9d619b39d9318217e8410ca1ed05a13ae154956d44b8a95b8ef930d38a6a924bbaf6be83e6b36025642d7f93ca78a9877357f3e0358697c7fc13d5ee0950f334366e1c2522957c53b17864fc31ea067d71b432b621ceb281b926bbb20452990900dc63dab3919e31e7ee50a32ad809076423e729542e82980fa9bff283fc8500d7975f3c826f511a9d2df312863ddd0e2dd99d90dc631a7784a7127dc9e2bc78ab60d2e5df2a207052db2da299419a4be44f171d8244615bdb422e12bf897a00a727e439d437d3fa91b7e6345031d82ece7567bae066fb271166884b228549575378b4887028fcfa3d52f95677d746558cec43d5e42ec19cb5d0b74700d85eea6acc1353753506d7ed76dc5f548fb3b0b181e7a7089809cd850412a894e415ff47d5d4736ffdd8bca7865abfd8f9d2d6c8e2342ef910d4b2e8c03fe5b6d2c65f1961216890cf463937c9582b5de87bb21a4a17bb2b9f930653f6088de586357eeb17cef15c29a77d364573a512eb04bd183351bc0c4efc397c2a04656ad758bd41cfc9c8e6c6a0f37a06f9112a9f8c65222846a07c5370fae2cb5fef953a4ec3df101a232953f791d6ae91d0c7cd7c01e8938f85c233f8953c4d4939065ed15ba4ed04a10d64be2f241f0fbbf46cbd4fae415e6252574a2c979e0490d06b975365ed24b880e7f7e472ec821010508331e8418b649b98d00385262c103220737d093f5140715fea1c1de4a4a0c5afba513ffed1ee4d0beff28656528c689fbe04d1d463a0919371552455e18eaa9794d601316c40227fbc4fabf3f731d15b3f792d594e3c3731ead3f21991bac841a9536b5c212fd531ceb342c42fd804cb961914b584f0ecadb67b485f98f59287c016d2808412a9058436766619fe0fa536beb3d6b6386f6d", 0x1000, 0x5}, {&(0x7f00000012c0)="135fcc1435affe4e7d8e9d074ff502611dd4c2d33e4d6935f9a6227247c791da9cb8c07711c63bf1dcd4b1b89261962261d67cdd4c6e43166064df848cf173111065357e8b1758d090fcced8e41292b87a6d94e70e7de1d1a471e85a8ab18aceae79c52d027d011b9b5e7b8c84694bf2cdc82f92bb266a8ebb0922dfb2c8c652cc6b57cd205dd484d3bac55e4bf6642a3fb061782337a525210681aa6c8aa3bd41ce8c79388e44078cbb82bcaca00414f4efe84fb6b9dd681f79f9a1a5496f0918b0cb66702e326bf9ce9fa3a9609292272c131f7fb09764dc09bc2a1e23", 0xde, 0x100000001}], 0x20, &(0x7f0000000180)={[], [{@uid_gt={'uid>'}}, {@subj_type={'subj_type', 0x3d, 'ext4\x00'}}, {@permit_directio='permit_directio'}]}) 09:22:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 441.874746][T24518] EXT4-fs (loop4): #clusters per group too big: 45537 [ 441.933896][ T70] usb 1-1: new high-speed USB device number 6 using dummy_hcd 09:22:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:36 executing program 4: seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast1}, 0x14) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x181) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0xfffffd88) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:36 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000100)="6c571a61f8d946ffd7b64b10725004f82990f0bc2b74ff7725e31705be991b6b43a56bbf3baf2e4b7afaa10c7e1de25396cca68366df3b06ceabb0c175e506b5dd38e9c0f27146beb2de80fbbe10d1f6020205a3125d7b0751f0bed7cbbd4ff4c360ba38d4c049") r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x40000000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 442.175801][ T70] usb 1-1: Using ep0 maxpacket: 16 [ 442.184700][ T22] audit: type=1326 audit(1600939356.864:24): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24529 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 [ 442.290481][T24535] EXT4-fs error (device loop3): __ext4_new_inode:921: comm syz-executor.3: reserved inode found cleared - inode=1 [ 442.304354][ T70] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 442.320141][ T70] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 442.341585][ T70] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 442.355471][ T70] usb 1-1: New USB device found, idVendor=045e, idProduct=03da, bcdDevice= 0.00 [ 442.365125][ T70] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 442.377150][ T70] usb 1-1: config 0 descriptor?? 09:22:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x4000}) 09:22:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 442.854468][ T70] hid-generic 0003:045E:03DA.0004: item fetching failed at offset 0/34 [ 442.862832][ T70] hid-generic: probe of 0003:045E:03DA.0004 failed with error -22 [ 442.980636][ T22] audit: type=1326 audit(1600939357.654:25): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24529 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 [ 443.055384][ T3179] usb 1-1: USB disconnect, device number 6 [ 443.833690][ T3179] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 444.073690][ T3179] usb 1-1: Using ep0 maxpacket: 16 [ 444.193711][ T3179] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 444.204591][ T3179] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 444.214319][ T3179] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 444.227337][ T3179] usb 1-1: New USB device found, idVendor=045e, idProduct=03da, bcdDevice= 0.00 [ 444.236362][ T3179] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 444.245121][ T3179] usb 1-1: config 0 descriptor?? 09:22:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r2, 0x0, 0x800000ffff, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f00000002c0)="00fc3112ecdfbfc560f39fd91effda0ad490f59c2b22465222ed3b7afdecd5ad0ed4543947bafc1c55f06b19c89e5060dac772ab72e2eea9265a65b2fe05ce475f823a73094a4a40789abbc71d2751b7a0c9e5b8a3dff2a5c019e6214288142ae3bccb675377d1b40161fb0759f23a2943e297108d5fbaaacd8c9c505d2091f591a39b0d42fc66fdf86de175a463066b5a48b43b890199715291ad3b2c2b16a266dd1bda28d8c94ec325500c115258e4889e3398b5bba754939c8370f87c89b1f1df6d2a9256a76b27e88c84fae7295c19617a") r3 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r3, 0x0, 0x800000ffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='./file0\x00', r0) 09:22:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:39 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x40000000) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:39 executing program 4: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x1c}}, 0x20000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x644}, {&(0x7f0000010400)="473e2ecffb2e000f000358d554132c352a1e55311800000000", 0x19, 0x1000}, {&(0x7f0000012600)="ed41000000100900d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x9f8}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0xdf0e}) 09:22:39 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000000018105e04da0300000000000109022400010000000009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@ng={0x4, 0xc, 'z'}, 0x3, 0x2) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="002222000000ff92"], 0x0}, 0x0) [ 444.501510][T24590] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 3475914311)! [ 444.512713][T24590] EXT4-fs (loop4): group descriptors corrupted! [ 444.533004][T24602] EXT4-fs (loop5): unsupported descriptor size 0 09:22:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:39 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x24e0}, {&(0x7f0000010300)='J', 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x9}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x9}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x824809, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) [ 444.583658][ T3179] usbhid 1-1:0.0: can't add hid device: -71 [ 444.589596][ T3179] usbhid: probe of 1-1:0.0 failed with error -71 [ 444.604641][ T3179] usb 1-1: USB disconnect, device number 7 09:22:39 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x5, 0x480080) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f00000000c0)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000140)=0x28) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x6}, {&(0x7f0000010100)="00000000fd0000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000000300000004b8e6d2c5666878e800000019000f69", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4000000000004008000000000000000", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x10001}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES32=0x0]) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) [ 444.659422][T24613] EXT4-fs (loop5): unsupported descriptor size 0 09:22:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 444.845016][T24624] EXT4-fs (loop5): unsupported descriptor size 0 09:22:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 444.927335][T24627] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 444.947916][T24629] EXT4-fs (loop5): unsupported descriptor size 0 [ 444.963819][ T3179] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 445.072304][T24634] EXT4-fs (loop5): unsupported descriptor size 0 [ 445.203567][ T3179] usb 1-1: Using ep0 maxpacket: 16 09:22:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:40 executing program 1: pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0xa) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 445.323624][ T3179] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 445.335121][T24641] EXT4-fs (loop5): unsupported descriptor size 0 09:22:40 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xff, 0xfb, 0xff, 0x0, 0x0, 0x3, 0x34, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x40, 0x12000000, 0x3, 0x1, 0x840, 0x9, 0x2ab}, 0x0, 0x10008, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000140)=[{&(0x7f0000000040)="fa310175c9c6c54f84c12e12e1d9f3befddb8b843e78283eda90181d7184cbe30eb6ad887cf7c7ef35aec360abde813c223e43b4a3de13e72b62397092f55df6dd06df4b87a2175b67bc8577451b13f98ea1f11b4127bfd3a6a28a70d9ad97574fccc45854fb", 0x66, 0x4}, {&(0x7f0000000200)="f8c8bea97e8918a356781622fa7b5cfa274127b7630379c4224408e6bd102a2173704291587474616365da8da8ff32854b10dad51f6f673bbe65d9d23c76d4826b4a3e2a22ce02e7826ec384f61ca67d838ebeee59c1401629af42a664dbc2334a747511cd1775e047ad388db8b87a4913df875d62d16bf43b101ed289f978556f04cf9e9ba717692d34c11a0b7e724e718214cc36dd78265d8bf28edb159c300caff9376ff7fb6c1bd0fdaa0049bd844d2ff00c127d0e619c25f82ab6cd27aed2656ef5ce56fc686f88f21c27e72d3ad8dce33e8466682a2b4adaa53ff6dd5c0ec85ac0ee", 0xe5, 0x7fffffff}], 0x3000881, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES64=0x0, @ANYRESDEC=r1]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f00000003c0)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x3, 0x1202489, 0x101, 0x216, 0x7fffffff, 0x5c61}}, 0x50) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$HIDIOCSREPORT(0xffffffffffffffff, 0x400c4808, &(0x7f0000000800)={0x1, 0xffffffff, 0x1}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xa) splice(r3, 0x0, r4, 0x0, 0x800000ffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$netlink(0x10, 0x3, 0xa) r8 = openat$cgroup_devices(r6, &(0x7f0000000300)='devices.deny\x00', 0x2, 0x0) r9 = openat$cgroup_devices(r2, &(0x7f0000000380)='devices.allow\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r8, 0x50009401, &(0x7f0000000ec0)={{r9}, "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"}) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000340)=@gcm_256={{0x303}, "4942a6e01c0ac846", "dba7e9b71b172b8eb88d3a60c689fe635d0b9853715db26015de296919ec4dc7", "f76b29b3", "dca85f4897ab61fe"}, 0x38) splice(r5, 0x0, r7, 0x0, 0x800000ffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000ac0)) [ 445.364860][ T3179] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 445.379789][ T3179] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 445.393270][ T3179] usb 1-1: New USB device found, idVendor=045e, idProduct=03da, bcdDevice= 0.00 [ 445.403120][ T3179] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:22:40 executing program 1: pipe(&(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x20000}) [ 445.418288][ T3179] usb 1-1: config 0 descriptor?? [ 445.478259][T24651] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 445.874236][ T3179] hid-generic 0003:045E:03DA.0005: item fetching failed at offset 0/34 [ 445.882774][ T3179] hid-generic: probe of 0003:045E:03DA.0005 failed with error -22 [ 446.081601][ T3179] usb 1-1: USB disconnect, device number 8 09:22:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x181) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0xfffffd88) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x10001, 0x5}, {0x7f, 0x4}]}, 0x18, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/vlan/vlan0\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) openat$cgroup_int(r1, &(0x7f0000000440)='net_cls.classid\x00', 0x2, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000001c0)="ec9b7562512f9e717706e466a52cb76c6acf9420bbbda2c73c6095742f3c25da57790f11c6b211e6d97936b1bb78529840dae1af8c") ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000002c0)={0x5, 0xfff, 0x5}) r2 = open_tree(r0, &(0x7f0000000340)='./file0\x00', 0x98001) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000380)={'mangle\x00', 0x21, "66f1225f301b7b6a193eb72bff97bc554fd3dbac0223244b4c2c0d913f0248be0b"}, &(0x7f0000000400)=0x45) 09:22:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x200000}) 09:22:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 446.616576][T24677] EXT4-fs (loop5): unsupported descriptor size 0 09:22:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 446.704965][T24684] EXT4-fs error (device loop0): __ext4_new_inode:921: comm syz-executor.0: reserved inode found cleared - inode=1 [ 446.739570][T24700] EXT4-fs (loop5): unsupported descriptor size 0 09:22:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 446.803625][T24709] EXT4-fs (loop5): unsupported descriptor size 0 [ 446.877969][T24716] EXT4-fs (loop5): unsupported descriptor size 0 09:22:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x181) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0xfffffd88) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:42 executing program 4: pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/210, 0xd2, 0x4) uname(&(0x7f0000000140)=""/148) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) socketpair(0x21, 0x3, 0xbae8, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000080)={0x4, 0x6}) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0xdc28}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x1000000}) 09:22:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 447.523346][T24726] EXT4-fs (loop5): unsupported descriptor size 0 09:22:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) mkdir(&(0x7f0000000080)='./file1\x00', 0x100) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x800) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x8e8, 0x0, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x830, 0x8, 0x0, 0x1, [{0x82c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x148, 0x9, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_ALLOWEDIPS={0x310, 0x9, 0x0, 0x1, [{0x13c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x1a4, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @remote}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x17c, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @multicast2}}, {0x5, 0x3, 0x2}}]}, {0x4}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_ALLOWEDIPS={0x68, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @multicast1}}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c='\xa0\xcb\x87\x9aG\xf5\xbcdL\x0ei?\xa6\xd01\xc7J\x15S\xb6\xe9\x01\xb9\xff/Q\x8cx\x04/\xb5B'}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}, @WGDEVICE_A_IFINDEX={0x8}]}, 0x8e8}, 0x1, 0x0, 0x0, 0xc085}, 0x40895) 09:22:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 447.649258][T24743] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (96 blocks) 09:22:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 447.787776][T24758] EXT4-fs (loop5): unsupported descriptor size 0 [ 447.794742][T24743] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (96 blocks) [ 447.936377][T24767] EXT4-fs mount: 52 callbacks suppressed [ 447.936387][T24767] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 09:22:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x200000}) 09:22:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f00000003c0)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x644}, {&(0x7f0000010400)="02000000030000000400000019000ff30200040000000000000000000f002e69", 0x20, 0x401000}, {&(0x7f0000000200)="ed4181acaa000000100000d46facf4655fd5f4655fd5a9655f000000008000000000a8360586239a2fb29d66faa8352700f9261e4b892f16b7059ad6d9591ac1c81917cbf8f65443d09aab76b12314dd892eb69fb39920dc9d4d7be7a33a9e3d34cae1dd86a29350a3527e1bca1c380fe72d49e40e20bcedba71775aecb38e49c81650a5954eefe26b8905b4ef0b798919c86a47ea0f701c77fa1324c100ecb3b48d36e66bc50b134d58e12febe1f3fc1f6859e95fa15a2f168c5b2a7d", 0xbd, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000040)="0569b35297b13c76dca505f8f6b2b9f9a9225d", 0x13, 0x1}, {&(0x7f00000002c0)="abb8fa17748d788c9008c1098d8983b6134fff4e3cd9e87d7690170342ad9564c05a95cf5c3ad141329827fb7b85db36e2983f52e6b5739354ec3b71916c3e90414b1e374a19383e3c4acc696cc2bfb972b9f3b75f970c2dea64b06e24c72fde19349768304518436210eae3a1968debb2fbfeea60230125353dc02217817df02563eaf59039c18d95ee09b116eb8863e43f9f4b80d61e5b1273a8ec33564b9c4b9228fef7d9e33e5dacdf39a7281560af52d05dbfbf01a582f169b9a775769afa8715c7c4625595273f5406b2902c035162334b15daed7907c267f82fc7f89a", 0xe0, 0x3}], 0x0, &(0x7f0000014a00)=ANY=[]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r2, &(0x7f00000065c0)=[{{&(0x7f00000009c0)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000001bc0)=[@dontfrag={{0x14}}], 0x18}}], 0x9800, 0xff03) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000700)) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x1, &(0x7f0000000540)=[{&(0x7f00000004c0)="efe0e610ae4072258d62676ca43ab8882bfe90d17c8a54254b72ebb142825fdc8741a1820881de6366daa62ff7bfc0d6edbd38eefc05c4913c81a8ab4c1bd8118cd029", 0x43, 0x6}], 0x1000, &(0x7f0000000640)={[{@nodots='nodots'}, {@nodots='nodots'}, {@fat=@discard='discard'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@fat=@time_offset={'time_offset', 0x3d, 0x25}}, {@fat=@sys_immutable='sys_immutable'}, {@fat=@check_strict='check=strict'}], [{@euid_eq={'euid', 0x3d, r0}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_user={'obj_user', 0x3d, 'security.ima\x00'}}]}) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x2000000}) 09:22:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 448.395024][T24784] EXT4-fs (loop5): unsupported descriptor size 0 [ 448.415603][T24786] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 448.428410][T24786] EXT4-fs (loop3): group descriptors corrupted! 09:22:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 448.526101][T24805] EXT4-fs (loop5): unsupported descriptor size 0 09:22:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) socket$unix(0x1, 0x2, 0x0) 09:22:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) [ 448.707950][T24814] EXT4-fs (loop5): unsupported descriptor size 0 [ 448.776579][T24818] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 09:22:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {r0, r1/1000+10000}}) 09:22:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f00000007c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x8000004400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) getsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000040), &(0x7f0000000080)=0x4) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 449.247650][T24830] EXT4-fs (loop5): unsupported descriptor size 0 [ 449.264761][T24832] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 449.312537][T24835] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: root inode unallocated [ 449.331262][T24835] EXT4-fs (loop3): get root inode failed 09:22:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x3000000}) 09:22:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB="0800070064010101"], 0x2c}}, 0x0) 09:22:44 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r1, 0x8, 0x70bd29, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private2}]}, 0x28}, 0x1, 0x0, 0x0, 0x40004}, 0x20000810) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a08000000000006", 0x15, 0x30000}], 0x82, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x2000}) 09:22:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) [ 449.372211][T24835] EXT4-fs (loop3): mount failed 09:22:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 449.451296][T24851] EXT4-fs (loop5): unsupported descriptor size 0 [ 449.470231][T24849] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: root inode unallocated 09:22:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) [ 449.520046][T24849] EXT4-fs (loop3): get root inode failed [ 449.527819][T24864] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 449.544900][T24849] EXT4-fs (loop3): mount failed 09:22:44 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r2, 0x0, 0x800000ffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xa) splice(r3, 0x0, r4, 0x0, 0x800000ffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200), 0x0, &(0x7f00000034c0)=ANY=[@ANYBLOB="e6b0bf29f1ccbba5c31cdf0ac7f1cba1ada6432cac16d85c8dc4c6e5a133f4c8076c64050e27e09de1b47921bf74218d53c8333b", @ANYRES16=r1, @ANYRES16=r3, @ANYBLOB="702e2a761551692adbdca8b9350e59f2ace0d4d3699b065a67ea59737521c7ab79e3a510aa8cab5c0124e1f0c1e04bd1009e67408328219f43091ccea69ba62b0511fb856d769616710c964aff1725f31c66637dd332f7e209", @ANYBLOB="70819d919b182890b0df5cefb4bfe9672f7e0eedc051151a561ef4172781adbe663d1873fe7feb5702e5e4353a27df76fd1910be5a2871f4c0ab29a5f2c85001f7780660efdc010f6066f8896fbc57aa2ed588cb57f4bb5d991c7e818e5a0556b3d74c7faeb4149d5bb922aaaa98a2216ebfb8f800ab8043e7ac14bb0ff2991a90a1c3a1068588af78cbd5c32bb4a23fab2b8ff8ae40d53aa8bd2b629ba492594aff362c977071090d321350ab3781a2194d10a9b438d6520f9f592d642302fa0012d92cb111a4f4887abd16ea6767105e7274690f7b64864b587fa2360c24b270ade3ed1dc4f6c359c9bfca1ebfd894e194ed2aebea07016590387efb4fa15a8322e4d15b0401519e1b7e92e36c2ef5b6eb2a0c003110cc9940996f51c01eb1d0e82ba4fe33af3637eebdc0bd70959972a687d60f852f026124a96af8691326b7c080ac329428d2ff3a248c4efc456c9d817a8b766552a067a37afde003e4c54560dbde7235f55bb1a09fe15afcd36ff7b8dfc76bcb664b45330c5c50a33f2d49ca78a3792dac708ef13d68ff80eadcc4f2c70a2e797981508b4ae4e7a48e3c12410a54796a25f5109ac8f20897503a2e22e713112102e6addd727b75b87ccb59a12465febc7e861c978f77349b2277edf70c2afc3c4073f5d4a32cbe159ddbf3ccac452c86d9d3e6f1ab9d6ed5a08b072e1dbde5e45c00452f1c15fa2d78d29352ed5d5815611c52ceba145ba408d769dc1491b130d86beca575e67c3de0a4167e97a4f0a541bb58449d9a9332b1df921bba2b436574335f598d01c9da3e3c3419d18ce80b0b9d79f83b1a768eb3133dddb49c139511fb05f61d2e749b3cb6ee3a1316a49ff50280c3922fbdc96a1344534d9b2f874f4c7aa6b7c66208ba39ad0f2cde46562269312969468430193d475a89d2cbeb216d1cb8972f314f82e155cb52b6e62f89dae74815b9a13f4ebd119a0d624834c8bf118e1b574c0ded04127ba296c726be5d9fcf881d1418daeb8a129924107eff663330539e6aceb6b318b09913af84ecb93eca97cee16055490782c55b8602c0829011544641012feb8a3e5ab42d56ee6a32597fc84d7ccf9120a4fca2962f6870bcacfc1f375d9e09e94209c6a3552461e5aabc604de44d3e168be7a61f542c8d13d8e7d4a6b8e4218c7509d7f03929cefd1e23acc0a26e20d02244bd77ef0d702db177366917e9363522af10a114e7b0168388019aa390f3a218471347b56b8f431932e3f0db7b3afb6ff84bcedfbe873a37677436f8a12de034e63b647659848dda9361b09856d1fec706bb67f3be21a84044e62c76bc1f63d056c91b39d0f07d6246f5bd8505941ded797f973d90795fb16f76541f7de5bcf1420d622e720491ab2cd9c1544523b602b51352bdee8e577099521f55ab7ba5dfbbc78d29053c4588af7f736f9c688a11d73ec6abf7d01c59045cde923c5d0d72516cd5303c9b47a5d5f580ca4729324409fa5e15b684084c2431bb59d48b01f66c0502e4c9193688d67b76eac0410bc3d0142df927127ebf7556aa4743ec50a933eebc4c396efd19341ed939740272bd7f9cd2d80c603fe8c6d2db72ee52134ab360407980d4558c69053e7b47a77139bc37b98970c4d4e1b3c616a2ba0d56b59b3bb143121ee1c839314e7534d647b1c1ce476f13d27cc9f40af064ab94afb2631a5178eec318c56eb981682caa5976e6fa69113c50b4109203bf279849e86b88a907e78a0b201777d27f0f592af5e8d089648497a32dfaf2b109db918d7e40d580ff732b0a47efa0caa1a1370046f896a1f71603ed845a4250bec22cae0298741f738e6b095f38b1506acc964ed9b0091992948edb6bd0c2e90e5bb5d13bcc691a785e7be9b55beb8eff710ded3c9a091c89ef9d07e4cd57b8dbcc33c7c4d01f5717ed7bb824d306b757d932ce2aab5d6144aab66cc77de1819aa9cb94a66e6016cc3b49c80c3c07fd30797bd8951d1056b665db657e12edb6ea8cba5e3259dfdc8be516849cbcb55a7ffac347835f8d8b75da110f3d0474f9d3bd9504f88b6e39be54df4184f3ff5e22d99be0b75ec2052f38280547a1c7095c125ccec3a0892eafd4a17f6ae7f382df3a6294b9e0b75788c66fc443878caeca203c395fdb2434ffbd08257dc15ba34960ac8f5484fb3c73bd95d34b8bd5cc415ec19ad09dc2b1dbc707804fcb4fffd5c3564a9b7c180b5d0408cbbaceaf0570e8b153401bbe6b4705981f8797a9833e547f6bd4f0e0bcd767ecd35a4fad0be4abecb3cdf76297468f2be290934cca277834bed99b0fe5030fbd9812282fe449933740417c1733918045fe119c72624ce1d2fed9af68be2c82bf5115306dc25704057cce0222133a7f7f11ee558d63a1aacec522036e0dd5b3f89543121260a2c3e714f0b64e49d8af480e2871224d3247bf08c278274111cab41f294ac5dbd0102caf2a6bbf027faf0c7e92b0a70685a4bace0780d842b7209975611ead0a249a47b84a551c699a9ae5508c7cb9da23fff783eb21aa6ca3139084ee72cc4b07f4f55b42b89f4db46180ad99ba4557356d081b11b7982bc31718bb90e1cf0e276e0d3eb624251ff2e70f28e232a12e15c913a63b10a522efdfa8c6197949b35ecfe1fdaba970df30037233c2fa1a4fac1bab33ab639959ae497cb03cd3e40b8d542737564dbb83746e181cd1c4799ab1e0e210f14a96aac71f5cb0ced48681bd01b30dca43cae01ca76c75ad00bf6d3464f24217d81fac02d88763df450d692fd4719296425b85fa516c1d6849c96a3ad59112bf4d1792f38e1b108c0af3bdf7fddc6676228ff47c5b93c15b3147f5544ce9c1cc3bc175675a148b907f6791923f03ed28e75c6328cea4363117782c05e8e1cb18d7e19243acaa225501768c98b903ef0e5a5a69c083551478eed0ee24a3d5adba04bdce86dc67c84e60c4a169913bccbb9be547ff649782a38463ae498903c61f6e7bade661ac53b06ee06b4f510373825f44a4e0f8042687751c92140b5f3582a7e5e39cc5d6bdbf98c65bae6eb67cd06e157420b5cacb7b8cd2bacee39fc2b36e5819887c39d3eb80cae9826333222cafb5deaf603fe3487858c4d53c6d87fdabffa248097bc6c45b0ba3182118bf39796f653c2eba18f72b1035e263934b2ea6275e95b8e97e45982e13fd7116d28fd780a913398c2dadff6c3f9ec9fbb516dfe1bb763cada8f1c9f49efa5ac9b8c4ee4efcf5e66b03e01ee2093c600425f096f432172163e74843771bf0ecfdd1826721b9418cbbd394784fa9d457c1c668369c6c3375a37f5e3ec9a1ff5152001879073c7e935bf979f5664945235f434c94de9d6799daf8a0508f884991424d1c3cd71648cbb138cf6949046a46d4ef942dcbe8b8707df29853c024870967a1ee21f59a451d736f7804effcc8b689c8346899d98c39715bad4a9bf928db2256e7d88e4b0098a51b058caedfb3960a6f32d1d2a5bd5826595c912bb694b73919306d8a2fa5ba3d3ec0deabb8bfc454c422d3d21eafb8def7ebdb379d8a099be998ea2a9bccadd5ba42be32e0f3e082071d258148c96fe95b023380294151d7c6f8e0c0fe63e3b15aa9b1362803ec9ce090e39b50d57d4a4a48ed8812deaef39b674b1cee83833ecc3111aeb1f181ffbc1f99f915485d9d47dd883546a7b0bd38e9f72a18c7c736feb0a6341eeee8121e3bdaef6f96931eec78e087f9884810882aa8f7076b0ccf0b0f197d94712b5c5b25fdce1ac2f3ee063946f6e1be6e36e349ef968c6c0d85f5e16942e5c75cb621a6abf07b77ace5c1d03ca6588d0483456419b0983d23bb14e011f9e4832ba242c4638675acaceb558ae6f8fd30b6098cce7776b29ec17eaece792440c2f4ecbcc1165127f47b77fdd6873a5926764124323848f3d379845a84be96058129cc4e58f003b2180581c03a0ca8b5432702afb6d30331a8085232d45af85666afd9d472f7820808dea976b5b4544f491cacd6590049d77f9095427659236a7671f922418faab1a76d0283646025ac2307548e93a0430d4ed58b4a4649c8d30fa366d317cab3a155747028c7a5452e78b7a0d70d89d6e4560296fe0a5be9c35a8d6e011e1fda0f28cff3174f86356d816efddec246b710a77ec6827e88efca3880359e1ae55bca020f8ce334aa0b4136195ccf9aade76e0ed2a65fb73686eb7ced48cfd942b71832171b5c656f994375c579bf7e9b79cf405ee5bbbfd3eb634305a59dba9a602f231bb417028e9dab4a2996daddb6b0974567ebef02c5830210af3e758dcb11d42c45d532a51fb8bee1a47fb327e73b034abd21864ce9eb5b4b4d9635818879c08acf61afc300118d0da0c80942fd2727c2451d6955606d14149ee0cfa92c1ef8905d87811dadf6ad73115b910c6c2b765f7c2744429740188ca60f71b315e80c7d38308d7ec6730925e6695eb4d8c9168407cf19d9fece481b149831bba8daac62a04ddeec936ec7724d29d54d3b0e5d92679b2529fd3726ef802b1c78bc5cff6e44c5a30ab3ce967af6b81e9644fe2391390e3d8968c9fa2a493797a9891c7e012cbe1f403f2f0f348d757377d14a232401232a76e3040b6ed1209ebc4db63cc22f651e01b5b4a9d27ae8ef8c5027cd3da811968144746508014a3c86cd3127442b29bb2ca81e110793f4a28f3e644ff7e85ab5439f033bea84e64316ad5ce8b03613ab6d45e61c1254da65adf83b1782097d3029e740d381fa5c892094251ba33a43f3f08fb9938a55c31207f21ff27215b80b40b3b378d6405fb3820f1e437ce03c6251ea4c83408e55c545b7479014d06a04e8771cd9b9febbdc5636e0d1f52e7d85ce2e4d1865c7eaf2320480593cf8e2c4370ffde5396b706b64f7edb5ca95ebff854ea95a2d430ebfbcbbc9abd5f98e0becd287de39e1cad0e949e654980262d5e2cf9641b1ca204521806e7381972bc97b2903899ca28f949252e073f2181972b1ab5085796bb0e3e5745e5dba88b1e4a7f07fed29071803d5e81a2addc98c46418d85aa7e64d0e5ea6e3b40f9ea8ae1f2b2949afe4f62cee5465796671345bf25dde37801634365df907d9d4695f1d37e58a82a21b8f294000d275f33372080bfc7938afc17d53a3fd12b6a838e2a46b87492c943c9cb50de19c64c3847475e2bf872951c56f3869abe1369019d67894b3d4598d1d7c3d74ebe77d160767f2e04f9042a7a8108fed97d5da3171297d3e63b4361b64597941e51fd11b7c37900722ebc71f694fd7cd7906e4c31f2d92d96c56735013cb5c2d4a5c846e305870dd260dcacc5a33f7ea8b3606b5b671b3bd4b018b2564afcdcedfb2cd013ce75185ceaf175d7c678ddd0a1b073da8e3e426fe9d13f06a488299f4174cca1802bbc987687fae4e226ae47d30bac63eb0716ae0a87aff4b6fc796f07ec3c6db80aca2022c2c92874c2da9f306a7b988a3ebba22ae8514a2201ffb395cd3fccacb4f38833017aa40aa77fe427db640745cda2c4332c9b8b47535b0771f86f96ad4a56eed7859a5d386b5a8f4268be3592fd8bfd2e345d19039a0a34f7a6c4a01548d4ce325958edab3c71cf8ad5fadadea6a91645cc8524d70b2892fe9900dd5b068862a0cfcdb779589e863e44702670cfbab425a793b156487f8cf6d3ea2d6e552b18e349a8c35602fa791c36dd164e0a6f84ef3a95ab807f96b489845599d9edea6a22c97d7a403c2fe16e5568c9f693ad2759cf2be14831ddd4bd567a08c68ec3911844ff83146345e469ec49c6308b188f1f55c0dbaeb210", @ANYRESHEX, @ANYBLOB="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"]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 449.565182][T24875] EXT4-fs (loop5): unsupported descriptor size 0 09:22:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) 09:22:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 449.772815][T24892] EXT4-fs (loop5): unsupported descriptor size 0 [ 449.864083][T24898] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 09:22:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x8000000}) 09:22:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 09:22:45 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0xf0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="96428fac84c5105ea42faddd50af03", 0xf, 0x100000000640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) renameat2(r0, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000140)='./file0\x00', 0x6) 09:22:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 450.375928][T24919] EXT4-fs (loop5): unsupported descriptor size 0 [ 450.395097][T24917] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 09:22:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x2c}}, 0x0) 09:22:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000a80)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000000880)="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", 0x1aa, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200200030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000a40)=ANY=[@ANYRESHEX]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) fchown(r2, 0x0, r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000140)="ada7cc8d11ed4c83f31418ceb285663935e2f915a46c02b8039466f4125ec2da0bd2e409198bb19cb48fc7c3fd60dabd8383d8b49c7a502f44443ee0269af02a79a7dc725410dc9a45e853644097a8a5cba53891e3837d50954e126efa35bff9e170ff973024b77698003efa8a2ac19222d5888bd80a21e7f6d4c0299c4c56d326e3e4f8c416c76087a943dfab31ac9508c76ecc4bd246ef05daae7e58cc3cc779fa", 0xa2, 0x246}, {&(0x7f00000002c0)="75e9670c8632e161c408e7259ce135abc050370240f023b468c45d0480ded796441e77c4c939cda47b7c66c9ac0240ed44daed0d40fc44d3a254a4a8f52d85b61b769fca23be21fbf13646c9135ecc214b17a50e6638e3a0483fdcab095330bba7d508c85bd80787a77efdb9cc32c5d2753f3eb8aff14dc013ee31db493afee16119e235a4be2ff61533691ea355ab78ea8d3100573548", 0x97}, {&(0x7f0000000380)="3e333abd00aeddc5eaefbaee1b18f44d43c5ef0bab9d3f71845d52a7b86830b26301ff4ba102ac8512fca7003881d3b7f74f7af46e21", 0x36, 0x1}, {&(0x7f00000003c0)="d5f72d2afb2eb1e469cd3cbab06d75ef6cbab9a6ae440d5ccaf00350a38c06037107ecf5587f9e95c1014c30f10d1a4d1dd8f0e9716ce3473fc2664357185104b606e2340b5d2aac99ed0c73182573b9ebc033f189504d01afa3262ccd067fa1df001503f485df141b6e1d748cbd919f965bce4c5d064c4eebce7f9f21e32419c2b4896c1059c8590b4d06c1746ceda0cfce5eb9e78d0c3e011e144281d03ac371db8e3698d9b261d8285b1e14b18554f91167e871de19e068d143d614678475ce1bd52f371329509a65e8cd3bbbdcf8f56b86da6f5fad56a953fbdc0672", 0xde, 0x1}, {&(0x7f00000004c0)="45e080398629ca545fbcfc97a67660c225acd4908f2b88599cec119a7bf4b054b1f1a42f30ce7ec117331e1db51dc71a25a758c1db224d974ab25e42d1fa514f5410b3945bd387cdf3225516df0222b552610e9559", 0x55, 0x401}, {&(0x7f0000000540)="1bab038fb9cfca9a70643f0f26c4dfa22f8bdf840e9191b1233b79ad1dfccb6b659d1f59146f7beff872bd0c594f5d58e13fbcffd98146a59eb1169d94602ed0b7b46a8d7e304d9288874780054f6e74d9a3129ab97cbfb6cb1f78eccb7865127d31", 0x62, 0x1000}], 0x200000, &(0x7f0000000740)={[{@mode={'mode', 0x3d, 0x4}}, {@huge_within_size='huge=within_size'}, {@nr_blocks={'nr_blocks', 0x3d, [0x36]}}, {@gid={'gid', 0x3d, r1}}, {@huge_advise='huge=advise'}, {@uid={'uid', 0x3d, r3}}, {@mode={'mode', 0x3d, 0x3}}, {@huge_within_size='huge=within_size'}], [{@subj_type={'subj_type', 0x3d, '(\x00'}}, {@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x0, 0x0, 0x36, 0x30, 0x30, 0x38, 0x61], 0x2d, [0x63, 0x31, 0x32, 0x32], 0x2d, [0x36, 0x36, 0x37, 0x63], 0x2d, [0x53, 0x7, 0x64, 0x61], 0x2d, [0x35, 0x63, 0x32, 0x62, 0x30, 0x32, 0x33, 0x36]}}}]}) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000840)={0x1, 0x69, 0xfffffffffffffff8, 0x4cb0, 0x8110, 0x9}) [ 450.521679][T24936] EXT4-fs (loop5): unsupported descriptor size 0 [ 450.555228][T24898] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 09:22:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x20000000004e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x7, &(0x7f0000000480)=[{&(0x7f00000002c0)="abe63665eaa5ca5f4199bbc351d99da03d49793acc790034859fbfd9e3e48e07b680d835cea4feeb5938bef180ba6fbe670b6a643a4a924eff31d91d471671d2327c300eafb948587bf2d9b2d0d9909424bfc0e8ba9ac3efcfd5a8a6adc327fcd276ad2d6a4fb1a5dcdef69dc31b0be6964ba463d757e05ee22689747d3b5b8bc3c929b596", 0x85, 0x4}, {&(0x7f0000000380)="b4d7270cb3bfe5593fc7125f0e2f54871a30f508237f444203243a524bbd03f1951d64d28bf732841022916173f01f942046fdc374aef434716bd3b18cf99319faf7e6", 0x43, 0x4}, {&(0x7f0000000400)="06937f49265d06507f04d04e113ab55ffc45a00c06cca801dbbdd37a7949ca3af6df2f7190faed05558888bc9499c11d8bf5dbe10ba0e6952ff18380aa23577d3d480a9cdbbe0b1f2e296057ca41c478ccb30ef9ca8a9cceff9118cf61e2462c3f7db93a882da275f54f4b2b8dbbae", 0x6f, 0x5}, {&(0x7f0000000140)="d0fa16d2ac8c5156d9159808131dae532a07d81c50fecad2e85799be40ff26ad3dbf45b35c3f43d0928fb7a196dcac78da84eea9ba", 0x35, 0x7ff}, {&(0x7f0000001400)="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", 0x1000, 0xbb8}, {&(0x7f0000002400)="47dcf37bf094e1c497c06c159fe19e2e71f5de34975c3afb1e63c85200444776d0bcb277ddc5b72a439263a40448fcc101340776d30b0b8fa231c1af417714e999e30bbc61e40ff30aef3d784113f8a8849c1f9ad7979686a7e33d1d2a8e6b72e1bb64841a077e5a1f642b5b188f4e7e89cc520e792f5b693ce52a8f38ee49fb4c6260e5fe89c9cd94ccb8fd90f01c4aff13163a3c40c054462d8221c57e1a4346be3d3f997b266aace2eb3e326b91279986d069e25f5126b04eab2d5aedadffd604705a3b0f05effee04e8195edd7d20fd129a38bb56d2f8f36270f3f2675e72d38a15ec40fb37d374b47ad8571432f595a36593e7cef34b138d71418bce3091344782f1bc166b99c9a1afbd210837fe71a8121cdd692a92dc72d3cf18e6c026a4f18bfa813222e1c3173138ee31a2588b639107e51cb137853a984cac5a47f1df06554f19603b530a36a8af4dfe699885c9e538ff14eda4bf92264348667a03cdd0f390237fa28e08c207ab4690c4a15a4036faf130bb19ee885e7bd397243e2bf8be0cfa16fed83665295b45c320dc6d1f616342e8e8f6184dfd1585a8476ccbe991bffc6caa2b83d30732f253f1f35f7e6cf1cc49f654d0eac1ae07b7d394e24ccd90fc3072811e05620913e34fffc8861490d61d7c04549f169ab88a6f88022849ea61240607ddf1e0e8bf73d04ddb354de003227b33f6548062a59cf4919f6818f624c02d6777569410c59555d4f167490f53138e681e9dd578bebbcfee3f7dad66df0212a01036fe91d9ca35bd4de8223e17541131e72ae82068dbdd5ee17988d2fc0166d17c7f57588b54a1cc2fe77330eabf2343190eda9922e2f2e757cd78ee770b6e69ab80ec146d2b5d9961b12a7963c33198ba9df20befbdfdc07c81be135673e4f43028c8a2fb9fa7377ea365fecda30121f4416930cc945cbf0d18d57fa4322997e9efd20e451030813ec5871b2964c7186f65b5b019b9820db9a7c00d69a1ebec97969c5aa2ef90606a13346086b2c440d3b708e0fda3981615c6d5fd3d62e6c8cfd468259c7d2a60c975cc1df6766878d0000e48ca63a83c21af2ee5a279dd4962aa47a71bb8168cfea5f64efb472b32522a2c32fb9582c61c070b0a0fb2036c6cf6b724463bdccd00d9a668cda20b1612912af109284d093763c463294f3795e652033f349bc16302471d60a1ef5c7a6eedc0d326bbe5e603a2e93f474658fcf4b8bbfb915ae1748f69ea5657a19e4adc8f4ff4fb2d51f28afdababab86a504afebc6e03d820689340d89a33017bb7a3ed865750d3381864dd3e28f5ef9060b589cf0b72f362ce288f241c49491d6d92a00331a74cf13fe622265aa9acbe2dfea6700fc50ee6adc5de0a2b14e24bbda64f6026fe1c72dcc6918202e87758b0aa60d124eb42e8ff525772a18e616690f06ccf9fdcde3e9f64a6b25c87a90a1fc4be73300accc5707aa9e90eb2f98ceae2424584f6eef5d08d9cc36e27f6dc84947b43340163b954b4c3097e1178bb657fb83916fbeb5b3eee54ac4179cd3b9d907f379ea64d976184e8553d795a4833dfa76c4a8dc293d50cb1b3d4230df46d3d0f30e96688c90e74d4cb23c42d5ae678aca317ab7613920e23cc0c9686a41ae71db2119bf30da9feabd2bb30fccb89c3f880c2fbc1ae0e802bce075b4a6e937e98630f0d9beffb16db104cd3e724c2f0a3326139a221d74a001e0c8cff30b826a1624a045d26875af8c9bc97dcc649d6ddc62f0ba5ebed76e1c03f9353318fbf33da8fe0f990e9c6fcf06fdd188978f5c1f4deee310dd9d1dfaf6de5b1fbe42eed8db4f0dfe7518cbd1765f2d31a90161f1a75cba2eda00bf6a9c0a9d1b856634b07f0b3eff5fb71c0e3cbda543aeabf040a530f3be41ab12223dc5440e44863c63a93ddce9168d54b168ba8e055c99e9164c444e1d05a7c76d6af64162edf5e8422de050e2b62bf6b15a28896c01990dfd25fa3bfb42bcee4856c1fe46321b6e31ee77a6942e49fa98a59e7b6380643faccc2a41fc3a1203af2055024762aeee32b740cb7d7de33f202d825501214815ba6957bcbf95036446e05c13877f30d7c62ec76e8b96acee9a58386a6e3dd811aa1b2fcd97d4e3735b28475022c1048934bca082b0d7e2e4e7bf4410f0ad57c468a2b621911f5c60524e65f6e793f01c4cc67d250003569f6fbf9b7031e8e85321f3401e11fcd73b317c012b1011836872fdf83b150b27f1622bea2f48e5ea5c372060d25cbbc8df4c3cb433304e54a9129f595f73a377223c4b13ebbd0d5b5336617711c6df60e88a89d34b2ff198711c16e900a524b03668589a9f0011121a40818cdfbdeb8ff82da3d99641a5494d414d4c25c1369eed86296e4db4ae3d9effa19d3d6a731394bea03262254c8867b98730f3b81488a75786b60995755d25a2eb8369f8ce490e6c625e51abd4f24b2440d1e44da6e25026832321c1fefa0b1930e638a7bc88e9bf53c0a2bc1cbfb332c3da50a837bfa09f1e380418bef08c956468bb63a8ea9fc55d63eb0a2896ddf5598c7521428d0d752f8cd83306ae234260609f3284b35870388f8e7bc4530e77c239227697ac53d6faf9cd8fbd8f6fdb63a856e9fc6934056b611d4834e92805352009d0f92b87e63a0e4cdabf9a73f701727a3d10c162291aa623aa0ffc242e756f7596dfab325ee9b714f431539a2878d117eab5e42ac262e5a6147655d2994bc07c2f65079e34eb591d44fda589f27230fa777c48c11b4b7d6c824aeaa1483d8e8653e7d7d4fd693e37cebf25aea40dd55e095fdbf6025dd828f78b6d9f43834c662024c4fa6894ebba6334e2ef711e7ccd26fa952aa6e8817963ed5d3be980d77a56f1a7219f4dcf3423205c5c8f5d15d69aca3b5ec0f4207f66c79d2343d63fe63946d80abd57a2750c524e41475d064c0a24a6c3fdc143044773ee645209defc35ef634db0b8a2fdcc43d5fd19a79fd0f76a1b078c1e5b1c8e8436c41c8be6692eccd140f3497c51ba900951dacb66b1192d698dd64c30f5e0cacbe73a6426827d93a02121b48ad81c92531e277e8381726e1adcbe5004c72687a9d69820a3f61302b74656ac923e9c0ed29cf30a1e2d37e83443cae92e895ba9a6b8195bd1b4adeeae850c3f372a69dd9e1102bf5f4555b4c0625ec0b46e39573041c58d1e8a82b996444e9cece84a09a5ae20c052fa41a01cf2ae323b3d6fbc82242cbd443e03c5e81b5405263617917c5cdd86ce41ed7a8665c1c1bfe470bb8815d3b050cdeb136182e586fdc5f4c3ed401ec74028b47255446d1bb94e59fe9d6282293153e2ec74cd5720f314f3417ef795383276a8bed91291816b5f1a7c0718c0e3f83808a70aaa15c42273cb7f10cc3885474a02196ca6ae6734768a417e0ebb57308803a63adebd532463fc8efe0e47ab03590730fc2069b142f6ac6f90dae06090fa291ec1e1d7a81d9474b5e7853a30778de28c46bca1b7c9da738536d7c22303ff1663701a8dd9360938f61d9db99bc61ec56f50c7afa252d12a5601cc866224e61500e72f4c05d5a89f9cf158ba9694f94066e458a73443015e9fdc4ee9e14c825f594e41edf75f802b053674a66db7cbaa5c870366c161a8810232b48a5c0d1229c54f73df00097ea3a66a3c13b91e5a2dc70973d0bdbfe551525320d35b3d605d797cbde958d61c833cee0e80fef6685e78171ba5d89a56f2508d68887ca299685fd0686050b58e8f66c88675d6ca83023405db9e3643993b58a25492686b7090ea2429fe50dc30c8c892c56bc1934abcaa6a28a000676be7daf34018269739487a7eacd90caf0f4a726cba727031886434165e0032b4ac28bb7a04012099a65ab3dd3a061e19746a8cd701a328e42d2c7fe15656becf16d404ed57f1d01e43a26590728c3a8a7f638d74293b19f397542fed957f50dd0c20496389896e8cb7fbf7ad3b053972df10212cdf49080e747a939d093b0c80bb29c1cd5fd0781265ba48e183329dfbcb861f133573d99162c6fa27ae44836e42d5d3f82fb922339113b40b5800cda5f9fef70083f136458f106a7c1af0248635c915511acbd53cfa2e36836b20dc1eb1e87ead5aff46be9003feb5a23a2045364a077cac36c6a4a5a663c6eb529c0c385d28a8b12bd2912fe2f63e8135a7af263f563b14ee9d1576273177c159a3156abd56d298785a9d3fe8119d003e346bb98b519b3dae7ab83a2f6eee3c1232a6701b4977a299586aabcfc75a7b913a8493c5e88b9268d3b0e7c3575e9eb98b22cba5c21334f3053925749e85fa23cf3126ef04685489cc141cb61611b53d9ce551b217ceadc9f0fc6f3432b45ef2cf03e6544708fef24d0724d7fabe2ae27105c9a1476f86fb9686d7d50b109135856f162187eb99a7a8cfb673be2963b42a3c0defc73cb2b65e1b73f7f81cb29c53cef499db35ea653dc8a4d85ebc5a124fa4a13b0f99f7887390d756a539ea3c82849fc42b3337b6fc68e855437294a2439ee8eca43380555520d27cafe797a902815d9ab0598c1c6942ee995fb427da0bc432632d54bc13d4f573fe4e5d2d99f3fa17bb3abf5b052ae4058fc879fd60e3c2eb2043d8011468fdba7e254a8c7255cbd1d8cdae1a0af4c90b95e3e148cc7d7b5d6c68ade7540c1e7d923d800eaf20e70a9699023b5b9a3e819fe34b6ef6d2de7ba95bbeeac4cb447850dc7421f7f2490e0d3c1bdfce53a74723017cba6d0c437e633b58ac27d66a23a4b94114d9b197d9de9e9f616709da394d658d9ccbc004d2a395b116b39b4013e65143a8c481366c575350b6114316177ba52321ec0f22ef15c6aa7ef273a233487567f76692face73086f6a7f9ae94b2048387c88285e0abed760b711586f3fe28cf1b728108674ccd4c3fcb298e6349687f7e8554efc70449b344ab251e85359157aa44c50418d47c448208150df23ba81a97df9a8b5e2966895aea1c3bae7f4456aa41da62a1ce2acf01ed7b90e942e35109d187e9e290a818ec9fc9c24abf1c46516f07ba3baa3978d8c84798245bf09fed9a1b48ba46179218a85f8ca16933cf379a3629c59cd44895d557d0573e73f0886649e62644774dea528390f670e7d8d1df4f1a01956fecdc17fe8be2d7b03580a900c7d3dabf1c39266a02f5ec7d36fb16bfcf6e3e70bea4ae2c7b7f63a08168135a9d2f87415f11ab70db25a5a2ff415f0ffe587362eb5accbf9a88a3df6904a787c6cac05d28f5b010672be5630d97e01f74e8f829a71185fe11ee2ee0bf0a5e1542e664bf9978a5ace1cde2cb33a844c2443964b8a85a9787b06c0b2156f9cf3e1018c9cd1cbc094222835c8f47be6007e487a0dd9a05cab0aac103b66da1ce7bc9f06b1262d4563f89b8b4405dcb99f99cc38e9540d9b333f8abe0bb5ec4f22b4ae06d80843915189ed70940c3788dd9bdc46df10c436a569fe59ef1d2a546d664dbcada5459db65337739921bb8adc30704b21f59ee9a9f144954affc6598b605f0c7204e611cd9e56405b0b02072b871713d6ae2d1f2c9521cf42134266843a78903f95e6bf06273008d2ae2a0e737eb7d0249ff5bf7e6e54d56bc6ea6122447e58b28ecaed73261d4d338f0b79fc00563b3aa533f664eb4fc023d3dd953e06c9e21533a124b39004f53431a4b52717c075c99cbfa8cd60d588735fd526836f03695cf609882d2abe4f361a0cd63feeaf8484fc4c3b5b8d7d587df160f41e5e88f7417e80b1a51a4a8e9d2d2e022d7e215beb8512efee4a3d22134bfe22089c1a00d42d9ebfed1b92d3d3865", 0x1000, 0x2}, {&(0x7f0000003400)="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", 0x1000, 0x4}], 0x1000000, &(0x7f0000000540)={[{@huge_within_size='huge=within_size'}], [{@obj_user={'obj_user', 0x3d, 'trusted.overlay.origin\x00'}}, {@measure='measure'}, {@dont_appraise='dont_appraise'}, {@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x2c}}, 0x0) 09:22:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440)='nl80211\x00') r2 = socket$netlink(0x10, 0x3, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="050400000000000000007e000000"], 0x14}}, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$netlink(0x10, 0x3, 0xa) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f00000003c0), &(0x7f0000000200)=0x10) splice(r3, 0x0, r5, 0x0, 0x800000ffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r7, @ANYBLOB="010000000000002300000b000000dd74501a26eb395e614c25dc3d3f4041d616f7b75e82ed9fe63c574441"], 0x14}}, 0x0) socket$packet(0x11, 0x2, 0x300) r8 = accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @initdev}, &(0x7f00000002c0)=0x10) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYRESDEC=r8, @ANYRESOCT=r9], 0x1c}}, 0x800) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="084127bd7020fc00000000080000000b005b0d000008003a000600000005202f0000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x20000004) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000006c0)=ANY=[@ANYBLOB="34210029a533139e16c6590600000026786262654e030009ca000000", @ANYRES16=r9, @ANYBLOB="000326bd7000fedbdf250600000008000b00addeeb7008000300", @ANYRES32=0x0, @ANYBLOB="086e0a48002c00010009000800390001000000"], 0x34}, 0x1, 0x0, 0x0, 0x20004004}, 0x4000000) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYRES64=r7, @ANYRES16=r7, @ANYBLOB="00022abd7000ffdbd16140757a0032b9bb82000000100004000800020001000080010400001400040001000000ffff000001040000090000000c00040020000000f8ffffff00000d0000000063c363d1e3ea7ccab7d47f41123064ce472d284cc9936ba0b8c603ddbe1c9f9dd5bf3ffc86529d65335700b60874fcbb4b502699243a5e1eec9348e5d62cc128b8d24139bb0277fbc2d8013a881f148ac7fcf15c53a5f3d9e6a700b0ecc007fad5ea44460000"], 0x54}, 0x1, 0x0, 0x0, 0x20004040}, 0x4) [ 450.671289][T24941] EXT4-fs (loop4): Unrecognized mount option "0xffffffffffffffff" or missing value [ 450.693473][T24952] EXT4-fs (loop3): unsupported descriptor size 0 [ 450.700012][T24953] EXT4-fs (loop5): unsupported descriptor size 0 [ 450.716509][T24941] EXT4-fs (loop4): Unrecognized mount option "0xffffffffffffffff" or missing value [ 450.918934][T24952] EXT4-fs (loop3): unsupported descriptor size 0 09:22:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x40000000}) 09:22:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={0x0, 0x2c}}, 0x0) 09:22:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e1}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f00000002c0)="8081000000180000d4f5655fd4f401008000000010000800000000000af301000400000000000000000000000200000030a1935940f49a4c1b5aec1b00c978186ac82d164c6f4588c72573e3c67f39b931784df911ffe355a784138a8d900cd10d8d6d6b91eb30e4318143f0b5c7261e4d1975010c75011eee9f656d489ace6f0d6149e2cd0757fa31154b7f93c44156fc933b366df67fd7afd3301c04e2cdbda6449c26d787aa52a932b00e12f5ffafe9f91d77be764ba9d470e63a48b517428480fe4f37c6789a3ae642e74ca0fcefc100b3606610d52f1c10657c4299ea8f945900"/238, 0xee, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000080)=0x4, 0x4) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000001c0)={0x3da, 0x9, 0x1000, 0x6}, 0x10) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:audisp_exec_t:s0\x00', 0x23, 0x2) 09:22:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000033f00000400000019000f00030004000b003d5800000000acd12845", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="b9e4c3738712508e6efaf3c60198389f8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32], 0x2c}}, 0x0) [ 451.250711][T24974] EXT4-fs (loop5): unsupported descriptor size 0 [ 451.263001][T24970] EXT4-fs (loop4): unsupported descriptor size 16384 [ 451.270462][T24973] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 16131)! [ 451.281368][T24973] EXT4-fs (loop3): group descriptors corrupted! 09:22:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32], 0x2c}}, 0x0) [ 451.348457][T24986] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:22:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x7}, {&(0x7f0000000040)="111fc0d908000000803a0900803a2900000000000633c944f6fbc74b3f189ed6ac85225cdcb02b62d65e3d2f200b789517d809c25e429b769b79093a3c11d006610e9dd20e0367f15d576c76c0f9f50540d6e9aef68ee205fadd2430898b95487b23dc4436c074387e29ef", 0x6b, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 451.424335][T24973] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 16131)! [ 451.434974][T24973] EXT4-fs (loop3): group descriptors corrupted! [ 451.449909][T24985] EXT4-fs (loop5): unsupported descriptor size 0 09:22:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32], 0x2c}}, 0x0) 09:22:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x8000000}) 09:22:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 451.490995][T24996] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 451.561736][T25002] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 451.572017][T24994] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 451.603548][T25007] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 452.039413][T24988] EXT4-fs (loop4): unsupported descriptor size 16384 09:22:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x80ffffff}) 09:22:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x1) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x1}]}, 0xc, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'erspan0\x00'}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) 09:22:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) r0 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="00100000", @ANYRES16=r0, @ANYBLOB="00002dbd7000fbdbdf25020000000c00040009000000000000000c00030040000000000000000c00050008000000000000000c00078008000100", @ANYRES32, @ANYBLOB="0c00080001010000000000000c000500c6eb1836ab0713120c0008000200000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x2000000}, 0x40804) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r3, 0x0, 0x800000ffff, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="06000000f036f42c1eef45bd53a4bac86a87c34c66b99dc14694f6e8140f98f679572101b9cb6f9573c3c909689cf0e41d9929e16bf22d66a7d0285c3f0fe4ddcbdcc1c8797de996a3a07a119747485e1e65105065a4d1cd17d8be8520373ace25d03027a02d2ae59e8a52d14b30d2b1ebbd7b54629148aeb41beb8a09976855169259e2e855ec1d6a0055d162a42f797931021fc15e6311c525b28dd3b5", @ANYRES16=r4, @ANYBLOB="000128bd6400000000000000a564e50b0100"/31], 0x20}, 0x1, 0x0, 0x0, 0x40840}, 0x2000c801) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$netlink(0x10, 0x3, 0xa) membarrier(0x0, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x43, &(0x7f0000000540)={0x0, 0x2710}, 0x10) splice(r5, 0x0, r6, 0x0, 0x800000ffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x38, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'gretap0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 09:22:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) [ 452.188455][T25023] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 452.197199][T25024] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 452.200726][T25029] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 452.220575][T25026] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:22:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 452.299175][T25042] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 452.331987][T25045] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:22:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) 09:22:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="b406fd9b0031f97260f7fde6fec2ec0800006311e80000000000060000000200bfe405004c0000ea00a748000012f9911fa60064df4a801e85d9d95129060f7601481fc50de7b75e5a08d194e11653f237b82a2a28d543aaec7f0e3cc55f7cd97a6bca2da0ad8a496687656bb3fe3a09641dcb14b6d94894c33b1a04097eb9da5c490d033e9c51d207f634e95174346b6cb63ad3cbea3fed9d3e883c7b0c39967dd3598478a1f6ad94321148724e03f521549945a18cedc8ae358b0a804156dd11b5c5b9c11ea0"], &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff, 0x0, 0x74, 0x0, 0x48], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:22:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 452.369680][T25049] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:22:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000e1f4655fe1f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000040)="0000000000000000000000001f4ebd2e6bb144ba8e000d53fbc5896c010000000c00000000000000e0f4655f00000000000000000000000000000000000000003f74420b6fe3596fc0e6bd98abcb8270a25a56a1e3b2a8fb9efdaade336c5cf318ff6637e5a676c394f8d5e209011c9aac21cd284c2983803b365c07f524dfd80edd856d4c9166", 0x87, 0x4de}, {&(0x7f0000010200)='\x00'/20, 0x14, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000e0f4655fe1f4655fe1f4655f000000000000040008", 0x1d, 0x4100}, {0x0, 0x0, 0x2004080}], 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="2c736d61636b66736861743d65787434002cf2736d616769633d3078303030303030303030303030303030382c686173682c61707072616973652c6673757569643d61626131653036302d633563642d34304a652d386537392d32636537323408302c6f626a5f726f6c653d7265736769642c00"]) [ 452.452221][T25059] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 452.462820][T25060] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 452.511635][T25063] EXT4-fs (loop0): Unrecognized mount option "smackfshat=ext4" or missing value 09:22:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x81ffffff}) 09:22:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB='\b\x00\a\x00'], 0x2c}}, 0x0) 09:22:47 executing program 0: unshare(0x20600) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4050000000000006110600000000000c60000000000bc0d29b6cd4cde9fd3a57d150000950000001d010000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0xe, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x4}, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x30, &(0x7f00000000c0)) tkill(r2, 0x9) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000002780)=""/6, 0x6) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x30, &(0x7f00000000c0)) tkill(r3, 0x9) sendmsg$netlink(r1, &(0x7f0000002740)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfc, 0x1}, 0xc, &(0x7f0000002700)=[{&(0x7f0000000140)={0x1ec, 0x1b, 0x400, 0x70bd29, 0x25dfdbfd, "", [@typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@broadcast}, @generic="a7729be0d0b81952c1acca4779fa587f0b49954592da6eab808ce709f32fc9e5e703bcae505c02aa3bdca7bdbb3b08b167a7aa90546c8e5b5810ba18d518c10a66c517ca4df379288a4e06ce2273531289c2947aa9649b73fe8bba0d4a17926b902edd929cb318adc613dd00b557faafdd47add26148d57621", @typed={0x8, 0x27, 0x0, 0x0, @u32=0x800}, @typed={0x4, 0x34}, @nested={0x14a, 0x3, 0x0, 0x1, [@generic="82e2f9fc61cc71de6a6d37a0fbfbc7f555895aab0c3bfae85d92caf34a6e0c17d7f15e5e8e69e2068aa217d94728a9e30f635d0528400f8d11eeba7bb322cd6408b6347af5bbdaf1579e2a8f41a8c3abdd4b0662c41de22db9e2798ea7beb54ba70d347e9d92c3cec3f3a53dd63b", @generic="717e326c5b8c9beceabfc48ee618ab824933ed62ee3c403ae2ccc9b2b6c8bed6ed6837bcba49f5ca17625e614b59cc86999ecc22c104dfe2c57aa75e1a40b2ecf90b4c2275e0684e9df8e80bfe0a203debdb20a188da6ba6bc365101e692efba85cae6430ac0fe2ca8968c3470d29a9d7cf4164b9cba2ac049a4374193ddf072fbd257fe2dfcee1343204365f448dc3f054aa973eef578cda0b48995e7e38b3c0d9607d74b9cd1d4de7476a4dd3bc9300c8a3d23a51442a85fe2559e67a47a420e8b6df1", @typed={0x8, 0x4, 0x0, 0x0, @pid}, @typed={0x4, 0x89}, @typed={0x8, 0x34, 0x0, 0x0, @u32=0x6}]}]}, 0x1ec}, {&(0x7f0000000340)=ANY=[@ANYBLOB="100000009b557fa5e6115aeafed9df25"], 0x10}, {&(0x7f0000000380)={0x2364, 0x1f, 0x2, 0x70bd2d, 0x25dfdbfc, "", [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r2}, @nested={0x1004, 0x2e, 0x0, 0x1, [@generic="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"]}, @nested={0x10, 0x41, 0x0, 0x1, [@typed={0x8, 0x91, 0x0, 0x0, @pid=r3}, @typed={0x4, 0x64}]}, @generic="8083e32c6f12420f06d36fab7a8de60b20690d866ed17e0abb7ab207424d466cc1ac93a77dc33b5a6e50eb8550f67e8c44ea936f8935ba7dc1dfab0a641d829323476747320a03434939fba0fc25453746b51059b98e67a50379c03fe1992016f9a43d6650d32d7eb5a79bc3e14fb754f417335998b41143395ac981b718cee79ab4cea0b5723e36d1b3ed648f901958bf22261ff2643d00e1a28c3caba155642d6a47775914e9c3310bb86dc876b8dc0793", @generic="f3960dc61e692d9b08e098ceeaa6a506ccfe67b8a4f61251341d5666548010308c3c72baa0610a47231654315e8a3aac9f813aec3ed99aec595c5c84c3a1ec573b69f3cc8e2e9f5a324ea6e6d01148a878bc5c36ea35b05fb92d7cc4ed22f415be44dcd9bda1891a0325bade3a3e9bc0042e6944c1e483b357a97ed91510b6c7d70b96616cd01248602c786321a32870fa9b03934975910954830969bb3489bfa8cb1cc8b21a0e1c13b3229423b0aaa89c338f4000288f87fe2974757eb805148533bd0ee6ce9fd1f4e748367a4731dc3dd054daec14e69171dc0e817292f2a14c316d5a8e2175af05d867bb6fc834528a63770ce06c2d02df1b26140737e94a003638c8ff906e22d4902aa4e03359a4e38f703455e4690bc62936ad7299a46b3b96e620399255034632321e2a86751555e74fec6554191ce63b397cb6bb3e88c773415b0e16bbbe6f5358669c5ec6f0fed3e43d7a2e43738b6d42997cb2804d027cce4b01d9c8fc4ae000937cb68890d0bbe828be6dc55ecce1a1e6f5400710215acbf0ced3d9d8b19f8179b80bde19aeb48dc4b8e8806653b3c3865e80fd46f1f3ec8372abcde0af07038d4ce8a49c01b8d2f0375d959c021fd48ba2aa1e7b27a7ee09f2076bdcce6bea21092635c950dfa10dfa6b1e9650812c32c9e9d06797ba913386f679041404ff55e8b9c4fca4907aa6562e1e9bf43c1e1dccc982c3ba2f66f0cd1f4ec722f515cb526d88bd787fece063c372bdd9298441d73acc0db627c9cafed69b82d9adc3ea7b134e17a97167990d9e21e51c9ff155454979d95255c9f278a200bb714b68a3c42d1552728ba44c137bde32764b5aec1fe72db9860b9a03a6a8ca4b53243b2c3f21b94c4c69357341132afc1aa04755148ce614cd42758889c8b4e9752112ff7130eca6925c470aca68c033350d24441aa5621a83a1811bf25743b2b5f9999497a72876024e2ad6b8230b870d2cccf1af40fd63e0dd918f91c07898c1bdfd0ec93d6a23aa91ebafed75bbc3864c440032c0ee0dd4e6400dde0db37ec2c9e54ed5f259ca029a4edaa81700ce871d6dbb8a72796dc8c1592cc1654b324e16d041ce76721ef64a6f67195ca74cf1976b948358820df0358dd2ae029567a5215ffe88091709dd0a02b5dfe4680d5ee82f367d6db49b4817ccf5bb834d26bd845b611d7a9c043cca62a95fa6a5dfd798606fdbae771689ab53a4dd819db3c2a0ef3b1f788b1149f740efe810b4917589d1aec6e48df4e333896f059616712f4cbf72dc89a23cfc1d2fdbdda3e59b24ae9ec8bbb0b9b41ad3b7552085272f868e74c0a3e19661ee67dffb4a35cbce1ff793154617f52af2d1992bb0801f55670dbf48a837d1ce1ec9064ffc571f447a63a4f34ed04e8b7e7581b983c74e6c6207c5fd0b10da9cc261aaf9f65e740731865044ced3384bbeee1dc08676f8afd58babb9a32e0e7a269bb1918a56014e5122a173ecedf29ac5e553626f843975b7dbb875bab921d2ec9243883dcc99e6e9d25429e85970aec46f3d88ab59e97c115e3d17f0426a592cc3be2224d91e4263dba1272b9f3d5733a3ba2fc9ad6ec7d5ec63b3dd636bef95758bb6684f3f76dc46e2c775eb86423812c23ec684928e3e38744dc115fb36664bcc970d277c331121a104bc5562f592c510a77dde5e57e78c5162f6d0022b3fbe20cbd0ffb79e7ae17a94a8d09a1c6d886a86a414811ef25b24d337006441942844db3fda7d39f6ae63d3d58f4c9f1194528f18b14194668c6216243a77e1e8c57f4c2243fa847a864ce0a36e2b5d3e437d9c5139112901cb1ae8ebf6493b99e8c5d6e391fd05dba27c5afaa191ef58b82a435202efc30b4f316bb156109c2bb19541d82a47bfc1fcdcea35a8c7f6b82ca02196f04b5bb0ce202a1b412472481249e6a0ab27709a7f19c88969b0331a85f07f876f0b6c59341d709e9ebe34a1a30bd48b70fa5f5f4081e70b5f705c2522473ab9fdb7e4983c456bd08df5644c3bc7a1232e91f0766d6ff2bb76b0444e3241871b5b4e39b86c83bf7f585a9fbff46f704e23be35ef48fc2c116de68bd69263fd4d6eb37a3f6a1c990c33e1e414ad77539658a5f6a8c40aeab7c5f448751e974a71564cad86b6213f5c77cc48bd40703033fe4d664204551dc6ddef91b5a01ba0d24a738112ef47efc139cf19c51d3ec7d21c07302194e16100e0213c0c3214755703e765139bea2592cb6fb0b85e08279b71476926b0437f3bffe28f11ad6b19092797aac787fae7fb104589586226967f0af87de20013eefd538de36166d3cf5d985bfcfb4538bdf697e3d6cecc167bd589bd5c8ffba7095d9038831af5067a59c4e6b23b17b63ca02d315cef68ab840652e4a0b7ed652dc4403cb9d38ac373fa0caba34fb4855f3426cfdc080c546560399db1155994ae5ebcb08d437a23391dbceb932252fbd9907c5d7b016248cb4d8de590c02132928593751af6d6ec3ed728e6e42f1c12cbffb3fb5a9441b6a572ee8a5dce28bbdd95bf6c5e0ecde8ee0e915534f393674beec8082e50d56bec9f89e8ee628c83efbf5b563ca130a3e3dc543afa8c456718616522b564510d5450d53ddd14776ebfb5df6b81450bee21d9dc05adf588c667bab2e1ca5591fa8e5d04ab123113679e56266e83ccd5ff77cf9033f948fde9fee4468f26cc263db7615a9e369e789f335e88873c8ff910697dc44cc9abc06658606e2c6435af37dea5a184a7ae1701ece46723ea898f89417552ae946ed717806fe8b384cb1d71631e217c4522687c0ec8e559ea62f98bdcd56ca6f7e533c9334d1df151314e4eafaa181b4ad4a33a073800d9829e489c02c904727ecc068c021f7af7c255be77106d68195c529e0ecd42b0f8498cd5c9d100c02842ca51e73a35ef5f2c527e3d3611ccc7447cefc078b9d554dfc0b3d2b95a530327587e258f23a1406ae919833a3b814be2be96301fdd56ad97d3fb9c7faa9c82c39335b6cb37812728c1b53b211f264247b24aa68c44a944966b7031ccd8d085bd01780228d7253f33a00b9dd293d7c1548d295fe9df05839c59e09c94ba48c0b2d2899d32fece393f9b9720abdac52d7279ee40a15842fd3e12a1c940053c4b4c2fa9fffdfc29f07b4db025094c6dcf909482c514d4fdcb15eb9feccefc791e788a5b2673a6acbc28b67874606593c835f28d3c27c386a00b4737c8a87490ca56618adfda346a5dc9ea4acda354ada4296b323451435b33cb4c1931721c180b6810d7fd43f4118c0056e13b2a0a9e723d9c5f0046f7e57da2a675b75bf3fc5fe99778c851f516515542097f1f4640e3c4498a10ab2299bc3640d6575a6222667affd1622fd2d9b141d98aa10e6d35fa50eb4f124c8aa4df36f5aaa349b3745a35db199595554cd7946bd65cd056c1bee7498468c2842e61e16344ee7926ced14e9af542c04e01bbe7ed6635ec69f725d42940495311694f7e4a89b8fa88df7322fb3f56fb54390d52cf0d2f2644b14e7c60964755236aadbc514c27f59a7f67178d7d80aa5b6323973b28564d299ab0bdf02a8e85fb2de84b21c6e1f224b25c74f658e59d95f0ebd6bb7e166d49f937796e6376c4425754e758748b43f50242130082b2a439f6e0ffe8bd7c5094995d2dd18de6c6284efceefae1be1196b095577066924e63e837aff0f52562740e46348dd17f0151cf99ef9ede0b4924b8beb0cbd68d30251a5b12f5b8e6c4c37c7fb8180e9ea4dfca233e17a25ba2cf9577c4a2d389483be9d031b433e0b5167ab8d7259c914e6aaa2c98483e90b7235ae917666f138b64c4984bfae77e2afb71b190e5ca142017fc998fe38ae6e089ecbbb90ae00b81d43992113486abd720ca27256da2cc9aa499cf78c300d908f7ca6e4ff563be1f7a639e4ec7ee1fbbcc5cd4f540ec675fb0deff7c78d8bd1195e94c82468e5d8c54346d83e34272bcb75125d56337fa3ee0932ffe7784bf1caa954567236d6073ee32d3a1977e7dd7b1c493d795c69787a1050bcc9fd58c78cab312e788f8008c72e476b2676e4124a45fe687e4ad8d56d404f37fe6b99d99f23e65a8be6dabb36caf98843a6c8260f7c9e129e2ff27d08b59e5a72b272b03dccee5908f165293b66ccb792052cd664041d31423a219802eb98b77a76c8fd4b176644f4feded8765bcff6ea2c75ed7f7071e33a2761b362421fbd9215141e14c61ecb06147fae7fac83e721984985415833da6081c2c9625b37088bbd8cf5e4b7b00023f023721e77c2d3b4f20d12fcab6b1b8d45d26434ddc440192b66845899eaa6fea83adb6616bc5ede3adc42709bbbe76c390e26ef6a4b3b80d9b3cfa9b2a742015b9324e77ede6ff0ba7ab04cdf912a6fd6ac284dd9cef25eebf73185718dc20551670f2ebc49d47f5f523b5137b700312177dfbb95b309879496066d600d3dde0ca4a2346bfdaaefefd27e7932ab8d30b3432ee0bc096f0f8c5af776239dce2ac95a360c76c59ce65a878c09c3afcb71d75dc7ae1b25bc65bde636317d699447ab6f07c6865687c6ccdce03e2f7aaf221ceef3f56ffab9e4dae10828fb6b7e90930a641517f33f1920816055ecb1905bf00ecd9b21e075515752668ea8d48df799264677ff6e525bb9c8de6d90452259fd051a2cb1315767ae0d8f589b3ce1728e8e98a07e6273ee911e064b73a2f8f39ffa3c5b2fafba877c98d4e13c474c856cf11b6a889b5e73eb9735dc5c34fe1c3e153d7e74766a900e4afa3ce3c480809bc8a3de77beab7140d7a40742c0d1c0dbc7621d0eb41151fb207b99e60feb7916fa3d13027df13daeb0517b8fbd63614da082ab676be5232bd19d17cd891db416ba82120df622e6e769d603cf51072a8431c4566d238f9a3f1214273ae2285af1d024f5f5765c3349c0208c2fd5e7ef1070cc5815be54e350a66c042489f6860cd825beeee83e50acf0e084b71e099e93000329b37275f18bd0bf2d4435ba91b1193a3467e9727a8e2db67a9bda16c82931293200b6d8d914b703f5c3e54a2138c58b75ecb82b83ed8b7d0fca8e6718e431e0dab03bf498f2bf32cc5a3eb91d733e79d8ef06d152d101ea3d1506b7de58265366a181171bf0e18bfd8c5c58ee4fa023a541582b6cad114795980f41d652fffd7192b7d7c6d7c5304df1e9bf89fbb72d78d96d825c3e4da10745dd6c24773de9a75e3dfedae17e6a1422c1cebf0462880189c75c9f9dec2e6ca8f7e8e4504ef85bd100451eee28ef579181665881835070a031a2defc7a735bee3b1349c2c19bcaa8fefdf0c9503d90896da3e483c2b52855b0ae34c5cf1f9ebfa1cab9d93bb8d1c85df7cabba47714128538c2e8d91c79ff5058d08907da82dd0fb791ff88c7555a144f3050b46f23d43011b2273107bf98888d95a604e53360631757102cbaeb60a69cf664f5b4686b492efa13585708ddff45151a53052f8dfa8aa91c40d99bb9546838a537808301a30e50f4aeae52c4f3dcc0d4df4f2c32beb655f369dce4e6a8bfc96a2c79e2d28981d054fb907bd406a678e4ee10b3e0eaed5f8438024d2883f50ee5132edd5e9252c91582a86232bcb1da62274ab64920edfcc431e10c77f4575aea88191221397884acf41d701a7c7185f6823022187352421fe3906f24b1939e0f6804695bc9b43a340fd49e38aa2cacb12adbbd5deccee185166e1c943ae3ca1652e6ed27cd55d1745b4dc6c7fb34ef3491b8467519bfbcf4bd3f79ad7eea97f2ad3f1564f56aa962147ecccba647890081409f09cc1f3232e3891d7ded7bd", @nested={0x3e, 0x21, 0x0, 0x1, [@generic="f0749e7457a7b8664d7c20a26820a7b53f0c0f5d9804965489c4bc2567531753bcee6566ba22c5d187b27822dd0bf199ddcf187e8c513018cdff"]}, @nested={0x241, 0x89, 0x0, 0x1, [@generic="61245d650a7d8afa92827ba6af2aa08508dfe00e153f9d6c610cf4043e40670baef78f949f359c", @typed={0x8, 0x4, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}, @typed={0x8, 0x83, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="80d5df94d6c79ccb70dd1dba06f5a36b7ee2b781db732dc27751e2b1b4efe8f2cabc3541d17f7d3e0ca71b634cf9fe510b1a6106cb72ec70d0a230813e949c7db724140553ddfbb405dd70265f91d40883f3d6b0ddf27cbc9a710d93e11c9fcada0a2f4e81beede1c1241ad6bb0c8ab8820d24fe817a3f7bb69b2ee5e598cf0bf37c09b16a0715ad42489d8d05c6d591cda8bc489abcf55b46c2faac59f865c7ecaa25889dd6947973373066d1c358618d3f02bd66a306039f88183095", @generic="033b5ce694ea45fecedca0c2d4738657d4324a16789ca35bc227c0d914251e6e25765598dcbbe4dd01aad820b0a5795d8f8129789dcdddb147cdb20e614f04aa35354c7151649b6ce6b38376beab11cf92781860b9a84fdc1b5f2e50a8dbdec997103be108ff9ef8df1d73575c1981f7d29600545199ffc3b3bb509cf46f0c95d955eaa2decd1ab389300a5384601cd2a1d9234e0b462915eee5d3f06cf44d704b2733d4fac07c1e876584ba4eb6fb6cb9f25c962f4a019b1e628949448d8960159953d9daedf9f3caa9e54a6a4cea6a07c2c8dca804de0356", @generic="7e5c152c3b64ca043567775ad4d6ca0eb5499427ba10d85e1a74b56c3758f851f76d9ac7f3d132607703ddf6773efc6fd74d5fc65523dec4063ca0850bdd3938c76ac80f1c9057b16a90f06049288e7bfcdaf6a6219e9832a3ce55c1ad19296571e1bd475c81391774379dff7a1c1b24"]}]}, 0x2364}], 0x3, 0x0, 0x0, 0x805}, 0x20000000) setpriority(0x0, r2, 0x1) 09:22:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, &(0x7f0000000140)={0x1, 0x100}) setxattr$security_ima(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:47 executing program 4: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000140)={{0x2, 0x4e20, @remote}, {0x6, @random="15a0e74f3571"}, 0x60, {0x2, 0x4e24, @multicast1}, 'ipvlan0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080)="000000000080000035ecb07c18ddfe11c4eb4a9b3af8c987be6aeafcd6c47e6c010040000000", 0x26, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0xfffffffffffffda1, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xa) splice(r0, 0x0, r1, 0x0, 0x800000ffff, 0x0) pwritev2(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="082c30cf3d7f15d636fb5e9e0520face8c", 0x11}, {&(0x7f00000002c0)="d235a37b374e0b75d2617ee98889bce3c54395fd203c556a0a8d1226f9b57a777738e14b797e22d663647d06bb10674104225873fdffaea2b09214ae5e16408a251016d5e5dd6462d1ebf31a5319e88f61bd1d75caf0c9fcb2f0cd01dfd351f68bd506dfd4e1dce9263f1dc33c4c6bf1afe0a7724efbde7617aa7700012a25b94d94cbee1504de1f7d9e20c8ba36a50a874bb78d2e50bd66beecf03f04b29a0ff77e612c3b36331e53d1d8f3feb51d6275c7b93f275c63e6d04dee", 0xbb}, {&(0x7f0000000380)="f3315ddba6d7c091fa3ebf0e0f0288e091c2b3385e03c2754d2deaf578d1616c5373aee3ba6c2870c23768e151b19340609037c28f9026a8a462f5bfe897951661ba96e7f28643e5018c0eb46eceb8f297fd72bca3fb7c7a0caee12e36aab2ed05a85f49ba3aa3219b0bdf48fe963af4a7e80f5973fdd969411b60fb849957d62cfb3f8adf8f385f4560d2cba12dc5af3cddb7749fa056b29b73ec0d6ef22ca7872475258164b6ab09e6019b8d3af903b411d7e28579977d43d31bf31b229fd7832f22ded9f3641ab0c99a5cd25b45c798248cb5fbcc0e581826e61885b7afde40774396d4b802a72bcfbfaa8806a396c779d06a1b9dc9ec4e9c9c0005032465119147e28a8f832ff3d6f8da190e20a67fca5d2df731a17de7eb1b9c1b5f718096929f509aa264499f7d6aeca6a42b38944d73d8d71975cc0e9ca80fdf8b53d193026410b1736f4584d3183b17b98f2f6310dc4d47c857d6225352c686a784b2db8724075df946ee2976a4f4a5f8a9e13de9908de7c2814c006e5adfab9c34815e3115cf91d58e03326c14650d8dc688a6697b5461158b97fe4a81cd9a2db6926a0f125aefd7ee62286ed56af6f67be98b4c670b22a2a00b15147413c287ef737a2c49b82efff7ba54a73899fad632061987527b52d7f313bd605cae0a31718652be35a28be0a973baea12da32d8d0986ea235600c9ea9cca3dec08cac67daf48c524fd64aef7ea6d675dcbac341508f57c072ee54d88a62a50b8070da1b38465fcc5e281b0d367f9d65893b65d695178b1ede57ddc8f221b05e695a2caa57c5478cccd404124fa8ea616d8103dd41713409ca1d4fd8cfd22c552007baec8d8261c1eb832507595115e26161c90e8815758ebf820b1f6e941b136c1dc60664fc55eccd4af9103244846850ab903edc951296f3a55fb77e3365272cfdfda2a427433c516edaa4fb8c230cffef9b521f4e8fddcbb6566c52fb10099c0c14a9e48191ea962246c6c33b17f55c72aafc7c975c8a85bdb6086839d5b5a3bd3252ad5e025911310a8a373974902cfddcd0e0ae640932d543e19344e6a6f781cc5f7f58bce4c7b6c4c249b2b2a5794dc7a56b8f066335d550e26dc279f169f7dc6319d3be799f4be2b9f33a2c406753cb20e3d16beb8259f429654fa6837e0ef314b4d68eceb4b20fe0701ef16f08f261cf401e3f18f7e772ceff9e4586617285274353037bec55acd307c3a8252f3a16da930d4cbeeee2b5c685413c317e7dc13a8e1fa814de5a246f690d12850012c2f13ef94ac9c4a5646fdc40e02d783037e410709776a6a518cffd02077e6344b78cd20837208a9936327b1edf75d385972004fad5b3e429af9d5a7b72b4fe4104be8b216b22787ee4c712c4aa71d4070ede7edbc971591692450b9ba6ea1ab04bf8da53c87ead724696223583f55dc72a92624bbd776421ad3243bbb3bc11ed7847480aa524f0ea5964ce5fc727b83bd5b719e6bb501c63d4489cc269b18b63ce0f6a325b10f5f223d6cdb09b88ef71843da73590a08e0d3a9e9d1f39b95db0e6c4ad2278c42ec150b8ad14fcb1fcb55a3cc4cd718eee42d7f174d514224125b4d6b79a14756a412d3635adce29950a564f21f2daaae70aefec4522a7c66de45357511a3d866bbc2317901a6c7be02cbc19b78686169dc8b8b418c6a24eaf7c0d7956447a6293f67de8a1295727851d31440f33c922a3afa09083900041d79c931f357a899536f0491e31758fded2c44868bbe00e386d728e170b972cfb1c6546eb739071bd16b9ce107871c3d3e81753ef201e901aec88174222454283e5f8194ae0f228892dba8eff2d54c44fc825965cc9daf53c4736b01ca0e55523996238514e7570410dd26c3c8172770c6fbdb57c6d6d8b6d42ff7d5a0f4141c885cb4265ec0c3ec276d1efcde384c6303a2a0f661c6906407bf2849a6b60b976ffc35ac6cbca31a6633f2445b3eec77d1a1d89cda97614b3c14dfb217062ed357c612b39208cde5d04dc33543beca625d460f8072de0e8f2387b9d9436818a756e42fcfd37f69e7dfe1096b7525d4d03c134a451cc59bf66b73fc985ab4a4e86629bf7c4525bf2b805597526d2c0c27fbf99d6223edd8e68f05a5fb22c44fb8ff094b6876205a9d2ded1e26b58ecc4a52b534a565b0b0718622e88cb1380ef26179fa425f7583e1ab322ba926002bb16087c191e45b6a60db2dd57e87a9f08c291cce4227e34fc6eba2bfdc3e04a56292ba840b62d18e7ca589f1778d8285c91bdbab690d036eb39df89969f9092369e8fb05da5b0a983a2e4230333889640d71eb2725871c28ef62bd45753f9328771b2d47a74ac871a4d0a3787c0071da052e1e92df300048709a5e423c8d20cebdca7019fd36eb02c6c6b3e7ad07474a504d6bb24a52aa6a516b489334aa93233862ac97fc1cba9848dbfd5010b8c67808e29760b5bebe0ce2aa7e576ff337a74e491b8ea18b62d06d9c2f545bb487a862f6312f0283d7b64fa241472f0cd98c0dbbcadad6d0ee81c479a9685fa32fa3b732238cda19ad66d9a0edf162af56ba7754348e4b359c17be1ca54b33e23614493b29c9b4e98ce4bdcfdfbfc895e097edb87da359f028c6d69e14843095a0d45738f7193b4479ed5fd8426b090e99bfb45a910a9d7ae6050d7c1f7cbb9e5d3151b97a9fb3e97d832b15d722331874de608fdb40e3b3267fed52cdcf1f7394f5621d4ea26c9e91dc8271f767408327e290f1096659b618c71c909233f320913d471a8ea668bdfad73a33d5a0c5d543ba5df2ee622410f30e7200938239faa62a93249858f4a8bfc4fe7cce31bb5f954e49bacb244b4d200948f77a306e76120aff045bcf10ba5948a0ab6f64980a7efa05b905c1a1e09256e9c75c2a8a872570d2e1db9abe563ac651a58314ed8587ffefda8c68a99fa5a3c25dad865c27543f209113b0d360e4c79803a3f7a85ffe5e0032c89bfda2c27363c375cad28cd59996f6f3d6197a4ac5e4b3bc3b49cf61fb370c7d9c7efbf4eb7372c0df2c410d9c213e44d36a12fec7b04fa7c8a2cbba1e91e98b0c840f43de5e48fb55b9ed0901077d5e2d68d6f2ed5b8012a9fd1428f7881c915a153e1d0e821c736ee4c318f0fe7c9c62736d14cc551529fc2cfc540b26421058f1735635057c7418d94f49513c392a03e93049e2712f4618c1dd232d45b06c4f93cd2a649591f54a422d299a6c584d9a644b9590939749a6bd9f34cfd57f2e48f60bcd101f54930c6bef54cf37616b40244c5ae3c2226a90d51dba5dd37f79c7a768ee83a25f0593cdb3fd80e2773b3227679c984e40b50d7983ce92783c2fb54c36315253b7580fac3ff851544161db2fc5690225b50a94d7ac18d35561c1cab6f7fc1f4f9e2c0bde6973293d5a9947a62c52de9c6174338e72fb84e055bc8008f62aace4558adbbad8d00349bba34ff610e401ae2e08b3fb9a84f6b97510b81d919dc98b7014434fadf880208f25dc9e8f2b6ce6c4878c6d8e82cd4b9f7739ed596222487491e58a7a3da5b490d1d4326ef6814aec9ea7215e2da9e1178a1db70fb027354eee558c56c2853a9462d8de3599bce69d0935dd6a0fca9b65cea7507d12b22135db3cc74ecc8bea54159706e0e2f753f4f558e1bf99a2c215c38f61275adce455a4948b8b484d727bd86e70672ddd007090b0f362f2473badab768f4760d59fb87113839b9ecda6d3fb307f958ee20db31bf00a2b29fe0a5a1303cbb21c42d971df852bfd2cebc5210c7020f1ce5dc4c2b31981565952f3b9c332d75bc0153c49e7c06ad2a22c2604169ff0fdbdb2a0985d233ba936e036125790e2b88447c513f8db40c1342bedad5b3a326867827d37ab5e02b1a93f8cae1ba4c8837a9eefb7a3a3cd7b1aa3fb8062d14cdc212261f04d34b14488cf9f3fad55d3864d54da463248943a5f25174f34f2e4a9fd1bb747f8eb79b55e5aa1dbee7806fb341bc95a0bee08e65b0e3727d83204653977c75b31f8391b49e2ce0abd170a5d25e863d80ddea82b10c5dbfc29accfab09dbfc3a6e7671bea89e0deebb6c3baacbc37ef5bad2ee1cfd5eaf79480fc214e8047ce95f2eb2b86b644cc52cf13c4cb5ae3690cf87df6efa616f759a37502695de653402a4a2d64af06b4ef8a3e90f7570acda6680cd8ed73bda2efbfa9a73e41e65e157514429752a5845b962d62240117a0897f963340a8b3197fd77565bcaa9fccfa8c08759a4898dbf7802322e77a710a94379c775dad69a25e5c1d11b62170063eb3216c8f00b09b8106bd777790577fccbf80d8147d28b328f9366b787fb72d2fa2de31921189a37f742848273888bdb9b489972358ed9c7a87d0732682ae040e6797c8ba3969dbe61b59b769781ec6940bc7276c10e83afdeff8600de60c5028f2f2cc5c4f1dd6609d0bc7fc23f1aea9ffacd3433e32260b79991c557b260883b883cede788c46e20987cd4d7093a4826167d8f3445c8625c23d21f3419933be9a1477901bc8723050b5eaaf38a3419d89e3ffb23cd6c43bd791b06ec75e14d8b59e3cfc612e975a57b420b4983c6e6f4daecd2f71bfe537638f865144dd485f8a2249d3214d544abc929729e942bdc54d4cdb44579ba9a2fa8f4008c4c79d3b2d4d010d8ce906d68bd1d91309e50e8345604c8e5160f20480159853a29add52007a134718df4d2d3625bfb0f4d0f7bbe4aff17351ec5e57229bafc04e0c027399dfa32b1c22cf57c610071d157d293f4a3e4973faf26f08fae91bc990972399df2010b46504e20f5a275d355a8b6f75b13698bfaec311258fe7aa98b898713d619b01b9ed5bf00d8ce84d5e1211c6c76347e97fc2eb09ca0250db65cae646c406f31b762024085796680f807a7e1910a81dc584eedb8a0dfc4a66876ffc4a2804a4cd88921bc17afe923d6da6b7bac107976e12e659c217577902a0fc66d1605b793584733e12b44b275be034ade941dd8011efe918a7f7bfbefcf5103d82e70f7ab18a4b0b8b33e08a869713916d0548053a75ca2fd8c57f33101afa67fb839887f89f34d5bc8831e3399a6b43235ce833babcfa315e24a39be16a4fc1cb84c4594a3a0c2ce4df7a45832a3259a03a0f113c5194be802b74d8c7288d1bbcdc60b7ce4924967376c67260ab210f64e319b8348ddc182cdc46c69fdced87bb1254e2c8a9485243854ed70fe220765125c6f8be59a68ad578ddff0ecf0d161f2d5e2c0122e89dd12523b9b95384907b528b2d5f2c5f5a21f74ff676f68dcba60c03757915a1c43b2718c44789791ea54ad5d8e80bbab8263a141ae7b993ae3b7245d575e79e2c3bcc9f25c67333a1e833c8336d79e1f964d4f26d1b9c79676c845554112db75c48f7ada96e359851da0ccb0e2ced610f4662c591f84ef5276a23a384019ca3628a2f7a9fe8a95768d7483266b66a5f190d2018b7347e77b3a3ae7f3106db094e7b1bb73ac5cbac0c8618d09f9da1d5b5cfde6eba4e47f1cf95ce87111fc93a9a940cfd4eecd00e9b9e013dad451faa179bf38b5ec60346fe61645d2dff4c6d2a466301067694ace4429fc145561996a7aa6521fd975dee23e9eb046a24da7b75e19c89e51c234d36556a6ba7a0fc1458a6cc0e3e8249eba7295a729be1c430426a7c1eac2bd082fd4057429c3428d8b2e9ca0fc35dff22eb5b07e5d691d666abc6b2236279faca59759eba2e5438d3a8f63d1c7a8a905a7a65ee27e3aa8d9dea51fa3c02ee951a937815a11bd80008416a45411331dd31e37adeb09897bf08228a44f503ff9e06", 0x1000}, {&(0x7f0000001380)="ba1296e7f5667ae1a97d40e40f29c932c168ea2aa871ce58477398682b61f5802f9021f0f4b0463ad9b330d5082ff496938129e9ac60e9b068f55261d95fd4ddd3c286eaf81260143f0d69e638091f3689354d79f5679fcdd6c5f93146695b4a9818e9f97ecc4fe9fee271c655776807f8", 0x71}], 0x4, 0x6, 0x0, 0x6) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) 09:22:47 executing program 0: r0 = socket(0x10, 0x2, 0x0) r1 = accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @private}, &(0x7f0000000140)=0x10, 0x4f2c39817db477f9) flistxattr(r1, &(0x7f0000000180)=""/18, 0x12) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty={[0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @private}}}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xa) splice(r3, 0x0, r4, 0x0, 0x800000ffff, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=@ipv4_newroute={0x2c, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfe, 0x0, 0xfe, 0x2}, [@RTA_OIF={0x8, 0x4, r7}, @RTA_PREFSRC={0x8, 0x7, @rand_addr=0x64010101}]}, 0x2c}}, 0x0) sendmmsg$inet(r4, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000340)="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", 0xfc}, {&(0x7f0000000440)="ba0e83503ca8b0cab5a823d7886344cf2ae66fb92d20aaacff73dba21fb00532735845fb4d7b911d4aebb1a4f06725e4887d9a4cba045c700da65ae3c4e85ef548d6ed74ec16a9d9d8eb80eb680c8d5a7be44345870bd70e70153ee7838c70aeae8ea16a2c8e7fd2861bdd6065c2b1675dbf1744b6eb84cf50fa3f0585faa526c37a9bf6ddcb97fbb7cd6ba097f07c2bfb8f8670a58936b2dd1c51e0f71bc03672829225a8672e25b84a575dc994ca52c49f3a664ba6af356a19c64a30f0b868e085538bce3be7cdb1e29c81bd7c53", 0xcf}, {&(0x7f0000000540)="3a7c83aa5e15fe57de2d125aebb81842273eb32ad84b50906be4ba9e051f7867627933610caf1faffa5813e5e5886102da017e44895a83f5108c0c3c6f1147fe5ed03cfecdecc6", 0x47}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)}], 0x5}}, {{0x0, 0x0, &(0x7f0000002740)=[{&(0x7f0000001680)="74f83d969110831f2061f906ebacee031098a01a3a4ecc07e666371ba08909238f8162f2588ba9d98bcf023c7b5878c72dc51b4e0bb1938b6893386c5acb660bffa8b9f940cb161e7485bdc77d7b", 0x4e}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000002700)}], 0x3, &(0x7f0000002780)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @private=0xa010100, @empty}}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@noop, @timestamp={0x44, 0xc, 0x6b, 0x0, 0xe, [0x5, 0xfffffff9]}, @generic={0x0, 0xf, "02ffc81dde67c4e112f2f69cef"}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @remote, @loopback}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x100}}], 0xd0}}], 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000300)=0x2, 0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r9 = socket$netlink(0x10, 0x3, 0xa) splice(r8, 0x0, r9, 0x0, 0x800000ffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev, @in=@dev}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) 09:22:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) 09:22:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080)="0014ca56fa26d026856ae60c42639fd91cadc00f5b91ec00000000723de3cf4ce097c13fee000070d6", 0x29, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f00000002c0)="02000000030000000400000019000f000300040000000000000000000f002e69fc077b0a6c7d840a6b2967ed447ea2a76d03b5dbf9e6715c91e92b782e318144f16c725e8070911cb7b4652b9e6aa6f87aceb9e47a53f6729de022b5fc2ed347c8883e1dd824284ddd940ac5ecdccd6c7a3fbf26", 0x74, 0x1000}, {&(0x7f0000012600)="ed5fd5f46501de0000000000000080", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000140)="111fc0d901000000803a0900803a09000000007a62d0f7ef3e25324ae8c5b515d17eb485d25ffb9ceec6b655a38afe4a3b1ebd855a0006", 0x37, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1) 09:22:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 453.077197][T25083] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 453.111002][T25090] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:22:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) [ 453.175305][T25099] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 453.249710][T25104] EXT4-fs (loop3): unsupported descriptor size 19663 [ 453.261639][T25105] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:22:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) [ 453.293069][T25114] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 453.313128][T25079] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 453.344067][T25104] EXT4-fs (loop3): unsupported descriptor size 19663 [ 453.357960][T25120] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:22:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x82ffffff}) 09:22:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) 09:22:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB='\b\x00'], 0x2c}}, 0x0) 09:22:48 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x105000, 0x0) ioctl$HIDIOCGRAWPHYS(r0, 0x80404805, &(0x7f0000000080)) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019009f6e0300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f00000002c0)="8081006079d1d49c655fd4f4bf05e4117e655f000000000000070000001c0010000800000000000af3010004000000000000000000000002000000300466abcb3137347a7c2dfebbfd99cf6570bc7f511cdb9a528136b1b7b9cb2cb0ee2bae25778ce9c4dde978b5acf72a710559977c1d1886bef3b732f27d59938c9ab0bb7e3bb715c19fb960a05448e24787f7937c000000000000", 0x96, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x401}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000140)) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 09:22:48 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x6, 0x5}, 0x8) fdatasync(r0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xa) splice(r1, 0x0, r2, 0x0, 0x800000ffff, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000140)=""/139) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000003c0)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000440)="111fc0d901000000803a0900803a09000000000006912bfbeb9e44d93c6e3c6c321a5f4746f33efda4fbf8b13b810417a4ed7dd78a854868eea801f4f1b6918ac88dad9a79809ccc29fb93e26eec2e9d21d2332347d623e8291a2620d7e318f0d086e9e353d9135d6b96de547372329ae253905f47e37b40db1ad317e58bb7f49691f17b16b9d41449", 0x89, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xee01) r3 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x14, r3, 0x10, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x14}}, 0x10) sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r3, 0x200, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000094}, 0x40000) 09:22:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x11, 0x81ffffff}) 09:22:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) [ 453.984049][T25128] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:22:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 454.053302][T25139] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 454.069469][T25145] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 454.098627][T25150] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 454.103016][T25139] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 454.110204][T25145] Quota error (device loop4): qtree_write_dquot: Error -649814293 occurred while creating quota 09:22:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) fchown(r2, 0x0, r1) chown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r1) 09:22:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000003c0)='./file0\x00', r1, r2) [ 454.158789][T25158] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:22:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c0000001800dd8d0000000000005f4c02000000fe00fe020000000008000400", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) 09:22:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4404}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x70000}], 0x0, &(0x7f0000014a00)=ANY=[]) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 454.299487][T25164] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 454.307189][T25163] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 454.471396][T25174] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: root inode unallocated [ 454.494148][T25174] EXT4-fs (loop3): get root inode failed [ 454.506401][T25174] EXT4-fs (loop3): mount failed [ 454.565494][T25174] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: root inode unallocated [ 454.577991][T25174] EXT4-fs (loop3): get root inode failed [ 454.584500][T25174] EXT4-fs (loop3): mount failed [ 454.866595][ T371] BUG: unable to handle page fault for address: fffffbfffb2893e9 [ 454.874328][ T371] #PF: supervisor read access in kernel mode [ 454.880284][ T371] #PF: error_code(0x0000) - not-present page [ 454.886241][ T371] PGD 21fff3067 P4D 21fff3067 PUD 21ffb6067 PMD 0 [ 454.892735][ T371] Oops: 0000 [#1] PREEMPT SMP KASAN [ 454.897926][ T371] CPU: 1 PID: 371 Comm: syz-executor.4 Not tainted 5.4.65-syzkaller-00175-g63d1c2f0b547 #0 [ 454.907880][ T371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.917933][ T371] RIP: 0010:check_memory_region+0x70/0x2f0 [ 454.923724][ T371] Code: 49 bd 01 00 00 00 00 fc ff df 4d 01 ea 4d 89 d6 4d 29 ce 49 83 fe 10 7f 2b 4d 85 f6 0f 84 b9 01 00 00 4c 89 cb 4c 29 d3 66 90 <45> 0f b6 19 45 84 db 0f 85 03 02 00 00 49 ff c1 48 ff c3 75 eb e9 [ 454.943314][ T371] RSP: 0018:ffff88819841f9d0 EFLAGS: 00010293 [ 454.949353][ T371] RAX: 4d68fb6501bfae01 RBX: fffffffffffffffe RCX: ffffffff818f09d4 [ 454.957297][ T371] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffffd9449f4f [ 454.965240][ T371] RBP: ffffffffd9449eeb R08: dffffc0000000000 R09: fffffbfffb2893e9 [ 454.973198][ T371] R10: fffffbfffb2893eb R11: 0000000000000004 R12: 1ffffffffb2893e9 [ 454.981141][ T371] R13: dffffc0000000001 R14: 0000000000000002 R15: ffffffffd9449f4f [ 454.989084][ T371] FS: 0000000001aa1940(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000 [ 454.997983][ T371] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 455.004537][ T371] CR2: fffffbfffb2893e9 CR3: 0000000198be0003 CR4: 00000000001606e0 [ 455.012495][ T371] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 455.020436][ T371] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 455.028375][ T371] Call Trace: [ 455.031727][ T371] dqput+0x74/0x770 [ 455.035508][ T371] ? ext4_es_lookup_extent+0x900/0x900 [ 455.040935][ T371] dquot_drop+0x1dd/0x2a0 [ 455.045237][ T371] ext4_clear_inode+0x4c/0x170 [ 455.049969][ T371] ext4_evict_inode+0x714/0x1a70 [ 455.054875][ T371] ? sb_clear_inode_writeback+0x2c0/0x2c0 [ 455.060562][ T371] ? ext4_truncate_restart_trans+0xe0/0xe0 [ 455.066337][ T371] ? _raw_spin_trylock_bh+0x190/0x190 [ 455.071682][ T371] ? mempool_free+0x84/0x380 [ 455.076241][ T371] ? ext4_truncate_restart_trans+0xe0/0xe0 [ 455.082014][ T371] evict+0x29b/0x6a0 [ 455.085879][ T371] ? list_lru_del+0x3fc/0x440 [ 455.090521][ T371] evict_inodes+0x608/0x690 [ 455.094995][ T371] ? clear_inode+0x180/0x180 [ 455.099555][ T371] ? sync_filesystem+0x19e/0x200 [ 455.104463][ T371] generic_shutdown_super+0x8f/0x2a0 [ 455.109716][ T371] kill_block_super+0x79/0xd0 [ 455.114361][ T371] deactivate_locked_super+0xaf/0x100 [ 455.119700][ T371] deactivate_super+0x1b8/0x280 [ 455.124518][ T371] ? deactivate_locked_super+0x100/0x100 [ 455.130119][ T371] ? dput+0x4ed/0x5e0 [ 455.134069][ T371] ? _raw_spin_lock_irqsave+0x1c0/0x1c0 [ 455.139582][ T371] ? find_next_bit+0xd8/0x120 [ 455.144230][ T371] cleanup_mnt+0x432/0x4e0 [ 455.148615][ T371] task_work_run+0x176/0x1a0 [ 455.153176][ T371] prepare_exit_to_usermode+0x286/0x2e0 [ 455.158689][ T371] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 455.164550][ T371] RIP: 0033:0x460ba7 [ 455.168413][ T371] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 dd 87 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.187992][ T371] RSP: 002b:00007ffe98148f08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 455.196372][ T371] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000460ba7 [ 455.204313][ T371] RDX: 00000000004031b8 RSI: 0000000000000002 RDI: 00007ffe98148fb0 [ 455.212255][ T371] RBP: 0000000000000b16 R08: 0000000000000000 R09: 000000000000000c [ 455.220196][ T371] R10: 0000000000000005 R11: 0000000000000246 R12: 00007ffe9814a040 [ 455.228224][ T371] R13: 0000000001aa2940 R14: 0000000000000000 R15: 00007ffe9814a040 [ 455.236165][ T371] Modules linked in: [ 455.240028][ T371] CR2: fffffbfffb2893e9 [ 455.244151][ T371] ---[ end trace 1886056e94e0826b ]--- [ 455.249579][ T371] RIP: 0010:check_memory_region+0x70/0x2f0 [ 455.255353][ T371] Code: 49 bd 01 00 00 00 00 fc ff df 4d 01 ea 4d 89 d6 4d 29 ce 49 83 fe 10 7f 2b 4d 85 f6 0f 84 b9 01 00 00 4c 89 cb 4c 29 d3 66 90 <45> 0f b6 19 45 84 db 0f 85 03 02 00 00 49 ff c1 48 ff c3 75 eb e9 [ 455.274924][ T371] RSP: 0018:ffff88819841f9d0 EFLAGS: 00010293 [ 455.280957][ T371] RAX: 4d68fb6501bfae01 RBX: fffffffffffffffe RCX: ffffffff818f09d4 [ 455.288899][ T371] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffffd9449f4f [ 455.296840][ T371] RBP: ffffffffd9449eeb R08: dffffc0000000000 R09: fffffbfffb2893e9 [ 455.304780][ T371] R10: fffffbfffb2893eb R11: 0000000000000004 R12: 1ffffffffb2893e9 [ 455.312723][ T371] R13: dffffc0000000001 R14: 0000000000000002 R15: ffffffffd9449f4f [ 455.320668][ T371] FS: 0000000001aa1940(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000 [ 455.329565][ T371] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 455.336116][ T371] CR2: fffffbfffb2893e9 CR3: 0000000198be0003 CR4: 00000000001606e0 [ 455.344083][ T371] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 455.352024][ T371] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 455.359969][ T371] Kernel panic - not syncing: Fatal exception [ 455.366713][ T371] Kernel Offset: disabled [ 455.371015][ T371] Rebooting in 86400 seconds..