, &(0x7f0000013800)) 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.264828][T21857] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.278646][T21868] loop0: detected capacity change from 0 to 264192 [ 246.296986][T21869] loop1: detected capacity change from 0 to 264192 [ 246.297963][T21859] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.317033][T21868] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:00:52 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038d00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.362171][T21879] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.379253][T21859] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.439521][T21888] loop0: detected capacity change from 0 to 264192 [ 246.444537][T21889] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.472732][T21890] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.486112][T21901] loop1: detected capacity change from 0 to 264192 [ 246.488466][T21888] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 246.511650][T21900] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038e00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.534937][T21910] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:52 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.619340][T21921] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.635978][T21917] loop0: detected capacity change from 0 to 264192 [ 246.645336][T21928] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.675494][T21919] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.689931][T21917] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 246.721009][T21934] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.743860][T21941] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.745697][T21945] loop1: detected capacity change from 0 to 264192 01:00:52 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038f00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.781414][T21944] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.799919][T21943] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.812183][T21948] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.830643][T21949] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.848820][T21955] loop0: detected capacity change from 0 to 264192 [ 246.849731][T21954] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.875642][T21955] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.902369][T21956] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.932980][T21967] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.938519][T21968] loop1: detected capacity change from 0 to 264192 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.993704][T21972] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.022467][T21985] loop0: detected capacity change from 0 to 264192 [ 247.028260][T21981] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 247.049203][T21985] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 247.084495][T21991] loop1: detected capacity change from 0 to 264192 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.121314][T21999] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 247.161097][T22000] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.164093][T22005] loop0: detected capacity change from 0 to 264192 [ 247.196870][T22005] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 247.203088][T22013] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.217940][T22006] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.279285][T22011] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.288962][T22026] loop1: detected capacity change from 0 to 264192 [ 247.303134][T22030] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.318288][T22031] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.318563][T22024] loop0: detected capacity change from 0 to 264192 [ 247.330591][T22033] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.383763][T22035] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.400637][T22041] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.412649][T22024] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 247.420911][T22044] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.441792][T22049] loop1: detected capacity change from 0 to 264192 [ 247.465696][T22043] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.508756][T22040] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.543882][T22056] loop0: detected capacity change from 0 to 264192 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 247.551162][T22053] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.569556][T22057] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.581423][T22064] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.586345][T22056] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.593136][T22067] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.621032][T22068] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.681901][T22080] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.682027][T22076] loop1: detected capacity change from 0 to 264192 [ 247.710476][T22083] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) [ 247.762702][T22086] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.792108][T22097] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.813287][T22098] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.826740][T22099] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.835363][T22100] loop0: detected capacity change from 0 to 264192 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.881018][T22112] loop1: detected capacity change from 0 to 264192 [ 247.890864][T22100] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 247.895235][T22115] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) [ 247.961140][T22130] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.038925][T22140] loop0: detected capacity change from 0 to 264192 [ 248.052710][T22140] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 248.058604][T22146] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.109170][T22154] loop1: detected capacity change from 0 to 264192 [ 248.140450][T22160] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.169164][T22163] loop0: detected capacity change from 0 to 264192 01:00:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000026a800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.220389][T22163] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 248.248219][T22176] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000002b900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.286067][T22187] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.367427][T22204] loop0: detected capacity change from 0 to 264192 [ 248.377935][T22206] loop1: detected capacity change from 0 to 264192 [ 248.382185][T22204] EXT4-fs (loop0): inodes count not valid: 32 vs 192 [ 248.402722][T22208] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000ffffffe000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 248.443583][T22218] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, 0x0, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.508432][T22226] loop0: detected capacity change from 0 to 264192 [ 248.520746][T22226] EXT4-fs (loop0): inodes count not valid: 4294901792 vs 256 [ 248.547719][T22232] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000026ec00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.569206][T22237] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.648574][T22253] loop0: detected capacity change from 0 to 264192 [ 248.650087][T22255] loop1: detected capacity change from 0 to 264192 [ 248.664260][T22251] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.693503][T22253] EXT4-fs (loop0): inodes count not valid: 32 vs 256 [ 248.695074][T22264] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 248.718619][T22263] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, 0x0, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.751423][T22270] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.827797][T22278] loop0: detected capacity change from 0 to 264192 [ 248.842418][T22278] EXT4-fs (loop0): inodes count not valid: 32 vs 256 [ 248.852707][T22286] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 248.897419][T22295] loop1: detected capacity change from 0 to 264192 [ 248.899915][T22296] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 248.917566][T22299] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 248.933295][T22301] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.946984][T22305] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 248.969017][T22308] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, 0x0, 0x0) 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x104000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.023325][T22315] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.036260][T22316] loop0: detected capacity change from 0 to 264192 [ 249.050098][T22314] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.057368][T22316] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.088069][T22318] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.099792][T22326] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20007ffffff200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.143563][T22327] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.163292][T22335] loop1: detected capacity change from 0 to 264192 [ 249.173637][T22343] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.183899][T22344] loop0: detected capacity change from 0 to 264192 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x105400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.195033][T22341] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 249.271841][T22347] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.273629][T22344] EXT4-fs (loop0): inodes count not valid: 4286513184 vs 256 [ 249.288927][T22355] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.312238][T22359] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.353986][T22362] loop1: detected capacity change from 0 to 264192 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2e02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.421277][T22378] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.472011][T22388] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.487592][T22391] loop0: detected capacity change from 0 to 264192 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 249.516277][T22391] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.567340][T22406] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.610315][T22409] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.610541][T22411] loop1: detected capacity change from 0 to 264192 [ 249.626914][T22415] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.642716][T22417] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.689627][T22427] loop0: detected capacity change from 0 to 264192 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 249.748364][T22434] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.750394][T22427] EXT4-fs (loop0): inodes count not valid: 32 vs 256 [ 249.783054][T22441] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.794907][T22443] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.807403][T22445] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.830628][T22444] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.883596][T22457] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.906686][T22462] loop1: detected capacity change from 0 to 264192 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.939870][T22470] loop0: detected capacity change from 0 to 264192 [ 249.975120][T22470] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4af000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.016902][T22481] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4fd000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.066970][T22491] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.097198][T22495] loop1: detected capacity change from 0 to 264192 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.115474][T22493] loop0: detected capacity change from 0 to 264192 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.161530][T22493] EXT4-fs (loop0): inodes count not valid: 32 vs 256 [ 250.182315][T22511] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.261241][T22518] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.273157][T22524] loop0: detected capacity change from 0 to 264192 [ 250.275440][T22523] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.287582][T22524] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20007ffffff800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.302216][T22522] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.328685][T22534] loop1: detected capacity change from 0 to 264192 [ 250.329987][T22529] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.372398][T22538] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.411365][T22541] loop0: detected capacity change from 0 to 264192 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x541000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.427574][T22545] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.448054][T22541] EXT4-fs (loop0): inodes count not valid: 4286513184 vs 256 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x550000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.470260][T22554] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x54000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x570000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.558439][T22568] loop1: detected capacity change from 0 to 264192 [ 250.565243][T22572] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x56b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.607681][T22581] loop0: detected capacity change from 0 to 264192 [ 250.621294][T22583] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.636753][T22581] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20007ffffff900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x970000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd04f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.741980][T22596] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.761752][T22601] loop0: detected capacity change from 0 to 264192 [ 250.781864][T22601] EXT4-fs (loop0): inodes count not valid: 4286513184 vs 256 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fa00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.810720][T22610] loop1: detected capacity change from 0 to 264192 [ 250.832606][T22615] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf04a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 250.927873][T22627] loop0: detected capacity change from 0 to 264192 [ 250.966333][T22627] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf0ff1f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fb00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.990140][T22640] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.022088][T22642] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.080387][T22654] loop1: detected capacity change from 0 to 264192 [ 251.120087][T22661] loop0: detected capacity change from 0 to 264192 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 251.142764][T22668] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.166337][T22661] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.203574][T22671] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.230689][T22678] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fc00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.248290][T22685] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.294702][T22697] loop1: detected capacity change from 0 to 264192 [ 251.309874][T22696] loop0: detected capacity change from 0 to 264192 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.336150][T22696] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fd00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 251.388324][T22713] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.456285][T22724] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3045000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.503768][T22730] loop0: detected capacity change from 0 to 264192 [ 251.527519][T22741] loop1: detected capacity change from 0 to 264192 [ 251.541238][T22730] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fe00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.593190][T22750] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.666892][T22765] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.683995][T22761] loop0: detected capacity change from 0 to 264192 [ 251.694080][T22766] loop1: detected capacity change from 0 to 264192 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.740833][T22761] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049ff00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 251.793169][T22784] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.862865][T22796] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.884196][T22801] loop0: detected capacity change from 0 to 264192 [ 251.888519][T22803] loop1: detected capacity change from 0 to 264192 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.917964][T22801] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000007ffff00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:58 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.986203][T22821] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.052153][T22828] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.072131][T22835] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.106000][T22836] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.119371][T22838] loop0: detected capacity change from 0 to 264192 [ 252.136894][T22838] EXT4-fs (loop0): inodes count not valid: 117440544 vs 256 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20007fffffff00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 252.168282][T22856] loop1: detected capacity change from 0 to 264192 [ 252.180417][T22855] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.229452][T22866] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.267645][T22873] loop0: detected capacity change from 0 to 264192 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.291367][T22873] EXT4-fs (loop0): inodes count not valid: 4286513184 vs 256 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.343823][T22883] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.387697][T22887] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.422572][T22894] loop0: detected capacity change from 0 to 264192 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb402}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.432448][T22892] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.459617][T22894] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 [ 252.459916][T22902] loop1: detected capacity change from 0 to 264192 [ 252.471593][T22906] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb456}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000003000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 252.529050][T22917] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.631910][T22934] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.647632][T22935] loop0: detected capacity change from 0 to 264192 [ 252.663941][T22935] EXT4-fs (loop0): inodes count not valid: 50331680 vs 32 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000004000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.716800][T22957] loop1: detected capacity change from 0 to 264192 [ 252.732081][T22958] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.787355][T22967] loop0: detected capacity change from 0 to 264192 [ 252.808050][T22974] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.838482][T22967] EXT4-fs (loop0): inodes count not valid: 67108896 vs 32 [ 252.848984][T22976] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.876898][T22981] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000005000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.941091][T22994] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.961972][T22996] loop1: detected capacity change from 0 to 264192 [ 252.975675][T23001] loop0: detected capacity change from 0 to 264192 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.997334][T23001] EXT4-fs (loop0): inodes count not valid: 83886112 vs 32 [ 253.009697][T23011] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x13000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000006000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.104166][T23027] loop0: detected capacity change from 0 to 264192 [ 253.115611][T23026] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.135365][T23018] loop1: detected capacity change from 0 to 264192 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ffff000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) [ 253.150005][T23034] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.197487][T23039] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.215212][T23045] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.218610][T23027] EXT4-fs (loop0): inodes count not valid: 100663328 vs 32 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x21000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.303360][T23059] loop1: detected capacity change from 0 to 264192 [ 253.322356][T23062] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.335884][T23067] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000007000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.443782][T23084] loop0: detected capacity change from 0 to 264192 [ 253.471785][T23090] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.484847][T23084] EXT4-fs (loop0): inodes count not valid: 117440544 vs 32 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.496948][T23095] loop1: detected capacity change from 0 to 264192 [ 253.520094][T23102] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000008000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.656174][T23128] loop0: detected capacity change from 0 to 264192 [ 253.669992][T23125] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.695817][T23136] loop1: detected capacity change from 0 to 264192 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000009000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 253.702767][T23128] EXT4-fs (loop0): inodes count not valid: 134217760 vs 32 [ 253.712626][T23143] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.834905][T23161] loop0: detected capacity change from 0 to 264192 [ 253.845375][T23165] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.865195][T23163] loop1: detected capacity change from 0 to 264192 [ 253.878672][T23169] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.911059][T23161] EXT4-fs (loop0): inodes count not valid: 150994976 vs 32 01:01:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000a000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.971293][T23185] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.999630][T23192] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.059287][T23201] loop1: detected capacity change from 0 to 264192 [ 254.080484][T23207] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 254.105585][T23209] loop0: detected capacity change from 0 to 264192 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 254.156764][T23209] EXT4-fs (loop0): inodes count not valid: 167772192 vs 32 [ 254.166080][T23222] loop1: detected capacity change from 0 to 264192 [ 254.185165][T23227] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000b000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.268804][T23241] loop1: detected capacity change from 0 to 264192 01:01:00 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r0, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.333589][T23254] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 254.346281][T23255] loop0: detected capacity change from 0 to 264192 [ 254.364193][T23262] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000c000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 254.393545][T23255] EXT4-fs (loop0): inodes count not valid: 184549408 vs 32 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r0, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r0, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.520006][T23290] loop0: detected capacity change from 0 to 264192 [ 254.554050][T23290] EXT4-fs (loop0): inodes count not valid: 201326624 vs 32 01:01:00 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000d000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.640613][T23318] loop1: detected capacity change from 0 to 264192 01:01:00 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.705507][T23328] loop0: detected capacity change from 0 to 264192 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.755881][T23328] EXT4-fs (loop0): inodes count not valid: 218103840 vs 32 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000e000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.808003][T23353] loop1: detected capacity change from 0 to 264192 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.916129][T23372] loop0: detected capacity change from 0 to 264192 [ 254.936999][T23372] EXT4-fs (loop0): inodes count not valid: 234881056 vs 32 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000f000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.986132][T23393] loop1: detected capacity change from 0 to 264192 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.072276][T23413] loop0: detected capacity change from 0 to 264192 [ 255.102390][T23413] EXT4-fs (loop0): inodes count not valid: 251658272 vs 32 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000010000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2e020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000011000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 255.224884][T23446] loop0: detected capacity change from 0 to 264192 [ 255.250017][T23446] EXT4-fs (loop0): inodes count not valid: 268435488 vs 32 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.294289][T23457] loop1: detected capacity change from 0 to 264192 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.363029][T23468] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 255.384023][T23482] loop0: detected capacity change from 0 to 264192 [ 255.394943][T23485] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000012000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 255.419445][T23488] loop1: detected capacity change from 0 to 264192 [ 255.429454][T23482] EXT4-fs (loop0): inodes count not valid: 285212704 vs 32 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.532245][T23510] loop0: detected capacity change from 0 to 264192 [ 255.547842][T23510] EXT4-fs (loop0): inodes count not valid: 301989920 vs 32 [ 255.552575][T23514] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 255.558197][T23516] FAT-fs (loop1): bogus number of reserved sectors [ 255.572726][T23516] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000014000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.626817][T23527] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.683222][T23539] loop0: detected capacity change from 0 to 264192 [ 255.709666][T23539] EXT4-fs (loop0): inodes count not valid: 335544352 vs 32 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000018000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.748846][T23555] FAT-fs (loop1): bogus number of reserved sectors [ 255.755475][T23555] FAT-fs (loop1): Can't find a valid FAT filesystem [ 255.779520][T23559] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.817303][T23571] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 255.856082][T23568] loop0: detected capacity change from 0 to 264192 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000019000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x54b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.881877][T23568] EXT4-fs (loop0): inodes count not valid: 402653216 vs 32 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.959700][T23596] FAT-fs (loop1): bogus number of reserved sectors [ 255.964931][T23602] loop0: detected capacity change from 0 to 264192 [ 255.966279][T23596] FAT-fs (loop1): Can't find a valid FAT filesystem [ 255.983737][T23602] EXT4-fs (loop0): inodes count not valid: 419430432 vs 32 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000022000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b33a20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.120737][T23633] loop0: detected capacity change from 0 to 264192 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000025000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.167525][T23633] EXT4-fs (loop0): inodes count not valid: 570425376 vs 32 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.276452][T23666] loop0: detected capacity change from 0 to 264192 [ 256.311014][T23671] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 256.333540][T23666] EXT4-fs (loop0): inodes count not valid: 620757024 vs 32 [ 256.339704][T23677] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002e000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.424892][T23689] loop1: detected capacity change from 0 to 264192 [ 256.455841][T23689] FAT-fs (loop1): bogus number of reserved sectors [ 256.462529][T23689] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 256.510329][T23703] loop0: detected capacity change from 0 to 264192 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.586188][T23703] EXT4-fs (loop0): inodes count not valid: 771751968 vs 32 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x550000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000046000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.628669][T23723] loop1: detected capacity change from 0 to 264192 [ 256.644904][T23723] FAT-fs (loop1): bogus number of reserved sectors [ 256.651564][T23723] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x570000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.736364][T23749] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 256.748351][T23752] loop0: detected capacity change from 0 to 264192 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.802430][T23762] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 256.828534][T23752] EXT4-fs (loop0): inodes count not valid: 1174405152 vs 32 [ 256.833987][T23765] loop1: detected capacity change from 0 to 264192 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f141457a000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000047000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 256.867809][T23765] FAT-fs (loop1): bogus number of reserved sectors [ 256.874450][T23765] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f141457b000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.970463][T23798] loop0: detected capacity change from 0 to 264192 [ 256.992522][T23798] EXT4-fs (loop0): inodes count not valid: 1191182368 vs 32 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd0010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f141459b000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000048000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 257.028735][T23811] loop1: detected capacity change from 0 to 264192 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.087333][T23811] FAT-fs (loop1): bogus number of reserved sectors [ 257.094012][T23811] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 257.132497][T23829] loop0: detected capacity change from 0 to 264192 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f141459c000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.176708][T23829] EXT4-fs (loop0): inodes count not valid: 1207959584 vs 32 [ 257.211992][T23842] loop1: detected capacity change from 0 to 264192 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000049000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.241936][T23842] FAT-fs (loop1): bogus number of reserved sectors [ 257.248678][T23842] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f14145bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 257.332636][T23874] loop0: detected capacity change from 0 to 264192 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x56b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f14147bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.391487][T23874] EXT4-fs (loop0): inodes count not valid: 1224736800 vs 32 [ 257.427435][T23892] loop1: detected capacity change from 0 to 264192 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000004a000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.462029][T23892] FAT-fs (loop1): bogus number of reserved sectors [ 257.468619][T23892] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f14149bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.531651][T23916] loop0: detected capacity change from 0 to 264192 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.588902][T23916] EXT4-fs (loop0): inodes count not valid: 1241514016 vs 32 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x970000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000004b000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 257.644796][T23939] loop1: detected capacity change from 0 to 264192 [ 257.658610][T23939] FAT-fs (loop1): bogus number of reserved sectors [ 257.665207][T23939] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa2331b000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.755112][T23957] loop0: detected capacity change from 0 to 264192 [ 257.770834][T23959] loop1: detected capacity change from 0 to 264192 [ 257.778566][T23957] EXT4-fs (loop0): inodes count not valid: 1258291232 vs 32 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.807949][T23959] FAT-fs (loop1): bogus number of reserved sectors [ 257.814672][T23959] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000004c000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.891580][T23987] loop0: detected capacity change from 0 to 264192 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb454}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.932483][T24000] loop1: detected capacity change from 0 to 264192 [ 257.934679][T23987] EXT4-fs (loop0): inodes count not valid: 1275068448 vs 32 [ 257.951291][T24000] FAT-fs (loop1): bogus number of reserved sectors [ 257.957865][T24000] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000060000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb458}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.079256][T24024] loop1: detected capacity change from 0 to 264192 [ 258.099100][T24030] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 258.122469][T24024] FAT-fs (loop1): bogus number of reserved sectors 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.129030][T24024] FAT-fs (loop1): Can't find a valid FAT filesystem [ 258.139382][T24036] loop0: detected capacity change from 0 to 264192 [ 258.166100][T24046] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 258.184524][T24036] EXT4-fs (loop0): inodes count not valid: 1610612768 vs 32 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000068000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.260944][T24061] loop1: detected capacity change from 0 to 264192 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10400000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.302360][T24061] FAT-fs (loop1): bogus number of reserved sectors [ 258.309204][T24061] FAT-fs (loop1): Can't find a valid FAT filesystem [ 258.340588][T24077] loop0: detected capacity change from 0 to 264192 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000006c000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 258.386086][T24077] EXT4-fs (loop0): inodes count not valid: 1744830496 vs 32 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10540000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.431426][T24094] loop1: detected capacity change from 0 to 264192 [ 258.436099][T24088] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 258.454880][T24094] FAT-fs (loop1): bogus number of reserved sectors [ 258.461494][T24094] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.483774][T24098] loop0: detected capacity change from 0 to 264192 [ 258.505306][T24098] EXT4-fs (loop0): inodes count not valid: 1811939360 vs 32 [ 258.522249][T24111] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000074000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.609994][T24126] loop1: detected capacity change from 0 to 264192 [ 258.638414][T24126] FAT-fs (loop1): invalid media value (0x00) [ 258.644566][T24126] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.668550][T24139] loop0: detected capacity change from 0 to 264192 [ 258.691206][T24139] EXT4-fs (loop0): inodes count not valid: 1946157088 vs 32 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x50040300000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000007a000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.786923][T24163] loop1: detected capacity change from 0 to 264192 [ 258.812216][T24170] loop0: detected capacity change from 0 to 264192 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa05714147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.833501][T24163] FAT-fs (loop1): invalid media value (0x00) [ 258.839510][T24163] FAT-fs (loop1): Can't find a valid FAT filesystem [ 258.857482][T24170] EXT4-fs (loop0): inodes count not valid: 2046820384 vs 32 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000008e000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.898803][T24189] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb05714147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.951143][T24199] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 258.983564][T24197] loop0: detected capacity change from 0 to 264192 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb05914147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.999576][T24197] EXT4-fs (loop0): inodes count not valid: 2382364704 vs 32 [ 259.023202][T24210] loop1: detected capacity change from 0 to 264192 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000008f000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 259.055037][T24210] FAT-fs (loop1): invalid media value (0x00) [ 259.061055][T24210] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc05914147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc05b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.146906][T24237] loop0: detected capacity change from 0 to 264192 [ 259.158571][T24237] EXT4-fs (loop0): inodes count not valid: 2399141920 vs 32 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.204672][T24246] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc07b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.258013][T24253] loop1: detected capacity change from 0 to 264192 [ 259.287102][T24262] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000090000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.304213][T24253] FAT-fs (loop1): invalid media value (0x00) [ 259.310224][T24253] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc09b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 259.366146][T24281] loop0: detected capacity change from 0 to 264192 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd04f0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000091000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.429751][T24281] EXT4-fs (loop0): inodes count not valid: 2415919136 vs 32 [ 259.466344][T24305] loop1: detected capacity change from 0 to 264192 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf04a0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.529963][T24319] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 259.543704][T24305] FAT-fs (loop1): invalid media value (0x00) [ 259.549907][T24305] FAT-fs (loop1): Can't find a valid FAT filesystem [ 259.552867][T24323] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.576529][T24322] loop0: detected capacity change from 0 to 264192 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf0ff1f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.616480][T24322] EXT4-fs (loop0): inodes count not valid: 2432696352 vs 32 [ 259.639616][T24337] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.686994][T24345] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000092000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.738079][T24356] loop1: detected capacity change from 0 to 264192 [ 259.763063][T24356] FAT-fs (loop1): invalid media value (0x00) [ 259.769112][T24356] FAT-fs (loop1): Can't find a valid FAT filesystem [ 259.772599][T24365] loop0: detected capacity change from 0 to 264192 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000008a010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 259.803675][T24365] EXT4-fs (loop0): inodes count not valid: 2449473568 vs 32 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.856334][T24378] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.912612][T24389] loop0: detected capacity change from 0 to 264192 [ 259.928219][T24395] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 259.932104][T24392] loop1: detected capacity change from 0 to 264192 [ 259.944306][T24389] EXT4-fs (loop0): inodes count not valid: 2315255840 vs 32 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e4010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.981637][T24392] FAT-fs (loop1): bogus number of FAT sectors [ 259.987761][T24392] FAT-fs (loop1): Can't find a valid FAT filesystem [ 260.016868][T24410] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 260.047913][T24417] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.073735][T24413] loop0: detected capacity change from 0 to 264192 [ 260.085953][T24413] EXT4-fs (loop0): inodes count not valid: 3825205280 vs 32 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e6010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.132158][T24435] loop1: detected capacity change from 0 to 264192 [ 260.154299][T24437] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.177526][T24435] FAT-fs (loop1): bogus number of FAT sectors [ 260.183649][T24435] FAT-fs (loop1): Can't find a valid FAT filesystem [ 260.212071][T24452] loop0: detected capacity change from 0 to 264192 [ 260.221646][T24451] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e7010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.235045][T24452] EXT4-fs (loop0): inodes count not valid: 3858759712 vs 32 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.305121][T24473] loop1: detected capacity change from 0 to 264192 [ 260.321651][T24473] FAT-fs (loop1): bogus number of FAT sectors [ 260.327808][T24473] FAT-fs (loop1): Can't find a valid FAT filesystem [ 260.329793][T24471] loop0: detected capacity change from 0 to 264192 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.363985][T24481] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.383007][T24471] EXT4-fs (loop0): inodes count not valid: 3875536928 vs 32 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e8010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.441178][T24494] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.487673][T24507] loop1: detected capacity change from 0 to 264192 [ 260.510818][T24508] loop0: detected capacity change from 0 to 264192 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.529529][T24516] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.541477][T24508] EXT4-fs (loop0): inodes count not valid: 3892314144 vs 32 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e9010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.584292][T24528] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.641631][T24535] loop0: detected capacity change from 0 to 264192 [ 260.651990][T24535] EXT4-fs (loop0): inodes count not valid: 3909091360 vs 32 [ 260.670695][T24544] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000ea010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.706609][T24553] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.718450][T24555] loop1: detected capacity change from 0 to 264192 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.769451][T24567] loop0: detected capacity change from 0 to 264192 [ 260.783064][T24570] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.804855][T24578] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.817817][T24567] EXT4-fs (loop0): inodes count not valid: 3925868576 vs 32 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000eb010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.898368][T24583] loop1: detected capacity change from 0 to 264192 [ 260.920094][T24595] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.957201][T24606] loop0: detected capacity change from 0 to 264192 [ 260.967352][T24607] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.990453][T24606] EXT4-fs (loop0): inodes count not valid: 3942645792 vs 32 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000004020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.057968][T24612] loop1: detected capacity change from 0 to 264192 [ 261.079477][T24632] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.117674][T24640] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.135775][T24639] loop0: detected capacity change from 0 to 264192 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.186583][T24639] EXT4-fs (loop0): inodes count not valid: 67108896 vs 32 [ 261.204481][T24654] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.227668][T24657] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, 0x0, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000014020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.261897][T24665] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000015020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 261.317220][T24676] loop0: detected capacity change from 0 to 264192 [ 261.342498][T24676] EXT4-fs (loop0): inodes count not valid: 335544352 vs 32 [ 261.350301][T24671] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, 0x0, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.424249][T24697] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.443340][T24703] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.457189][T24701] loop0: detected capacity change from 0 to 264192 [ 261.468127][T24701] EXT4-fs (loop0): inodes count not valid: 352321568 vs 32 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000016020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.503598][T24718] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.566745][T24733] loop0: detected capacity change from 0 to 264192 [ 261.581627][T24735] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.609058][T24733] EXT4-fs (loop0): inodes count not valid: 369098784 vs 32 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, 0x0, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.630779][T24746] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000017020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.694026][T24751] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.771506][T24772] loop0: detected capacity change from 0 to 264192 [ 261.779798][T24772] EXT4-fs (loop0): inodes count not valid: 385876000 vs 32 [ 261.803641][T24775] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000018020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.913731][T24795] loop0: detected capacity change from 0 to 264192 [ 261.945422][T24795] EXT4-fs (loop0): inodes count not valid: 402653216 vs 32 [ 261.951010][T24807] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000019020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x56b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.058576][T24830] loop0: detected capacity change from 0 to 264192 [ 262.097486][T24839] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.099105][T24830] EXT4-fs (loop0): inodes count not valid: 419430432 vs 32 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, 0x0, r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2e02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000001a020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 262.196051][T24830] loop0: detected capacity change from 0 to 264192 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.255174][T24868] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, 0x0, r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.350714][T24895] loop0: detected capacity change from 0 to 264192 [ 262.389664][T24895] EXT4-fs (loop0): inodes count not valid: 436207648 vs 32 [ 262.451754][T24920] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000075020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, 0x0, r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.533967][T24933] loop0: detected capacity change from 0 to 264192 [ 262.545719][T24932] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.586947][T24933] EXT4-fs (loop0): inodes count not valid: 1962934304 vs 32 01:01:08 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000030100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 262.685151][T24961] loop1: detected capacity change from 0 to 264192 [ 262.713522][T24975] loop0: detected capacity change from 0 to 264192 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x54b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.783494][T24975] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 262.809975][T24993] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.821506][T24975] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/775/file0 supports timestamps until 2038 (0x7fffffff) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002040100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.001169][T25038] loop1: detected capacity change from 0 to 264192 [ 263.001290][T25036] loop0: detected capacity change from 0 to 264192 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 263.062950][T25036] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000006040100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 263.124887][T25059] loop1: detected capacity change from 0 to 264192 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.179360][T25075] loop0: detected capacity change from 0 to 264192 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.236262][T25075] EXT4-fs (loop0): inodes count not valid: 100663328 vs 32 [ 263.245261][T25085] loop1: detected capacity change from 0 to 264192 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000010040100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.334273][T25099] loop1: detected capacity change from 0 to 264192 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.409352][T25122] loop0: detected capacity change from 0 to 264192 [ 263.443600][T25120] loop1: detected capacity change from 0 to 264192 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.484146][T25122] EXT4-fs (loop0): inodes count not valid: 268435488 vs 32 [ 263.511806][T25142] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000050100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.556899][T25149] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 263.597659][T25159] loop1: detected capacity change from 0 to 264192 [ 263.612397][T25160] loop0: detected capacity change from 0 to 264192 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.664363][T25172] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 263.668126][T25160] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 263.691097][T25175] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.719980][T25160] System zones: 1-2, 19-19, 35-38, 46-46 [ 263.751859][T25160] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.768170][T25186] loop1: detected capacity change from 0 to 264192 [ 263.774806][T25160] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/779/file0 supports timestamps until 2038 (0x7fffffff) 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000060100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd001000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.847821][T25199] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 263.862655][T25206] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.899255][T25210] loop1: detected capacity change from 0 to 264192 [ 263.918188][T25220] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 263.973733][T25227] loop0: detected capacity change from 0 to 264192 [ 264.006789][T25227] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb456}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.029749][T25240] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000004060100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb458}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.067293][T25227] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/780/file0 supports timestamps until 2038 (0x7fffffff) [ 264.093658][T25249] loop1: detected capacity change from 0 to 264192 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.132477][T25260] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.159155][T25265] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.217922][T25275] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.236241][T25279] loop0: detected capacity change from 0 to 264192 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.260215][T25280] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.271516][T25276] loop1: detected capacity change from 0 to 264192 [ 264.289790][T25279] EXT4-fs (loop0): inodes count not valid: 67108896 vs 32 01:01:10 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000070100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.392198][T25305] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.412045][T25310] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.433647][T25314] loop0: detected capacity change from 0 to 264192 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.435420][T25304] loop1: detected capacity change from 0 to 264192 [ 264.460018][T25314] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.479658][T25314] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/782/file0 supports timestamps until 2038 (0x7fffffff) 01:01:10 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000090100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.542675][T25331] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.573603][T25339] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.606359][T25344] loop0: detected capacity change from 0 to 264192 [ 264.640613][T25344] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.680859][T25362] loop1: detected capacity change from 0 to 264192 [ 264.692342][T25344] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/783/file0 supports timestamps until 2038 (0x7fffffff) [ 264.694542][T25363] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 264.740240][T25369] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.822591][T25384] loop0: detected capacity change from 0 to 264192 [ 264.840654][T25384] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 264.854854][T25384] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/784/file0 supports timestamps until 2038 (0x7fffffff) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.855290][T25385] loop1: detected capacity change from 0 to 264192 01:01:11 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000b0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.909210][T25401] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.977218][T25412] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.014230][T25422] loop0: detected capacity change from 0 to 264192 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.030272][T25422] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 265.038380][T25422] System zones: 1-2, 19-19, 35-38, 46-46 [ 265.056842][T25422] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:11 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.075416][T25422] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/785/file0 supports timestamps until 2038 (0x7fffffff) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.144006][T25443] loop1: detected capacity change from 0 to 264192 [ 265.151423][T25446] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.197323][T25458] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.214584][T25459] loop0: detected capacity change from 0 to 264192 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.247687][T25459] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 265.260760][T25459] System zones: 1-2, 19-19, 35-38, 46-46 [ 265.286092][T25459] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.299080][T25459] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/786/file0 supports timestamps until 2038 (0x7fffffff) 01:01:11 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000d0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.340990][T25478] loop1: detected capacity change from 0 to 264192 [ 265.354388][T25483] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.379407][T25487] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.430110][T25498] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.480529][T25510] loop0: detected capacity change from 0 to 264192 [ 265.489849][T25503] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.507236][T25512] loop1: detected capacity change from 0 to 264192 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.526140][T25516] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.580570][T25510] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 265.590859][T25525] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.601406][T25510] System zones: 1-2, 19-19, 35-38, 46-46 01:01:11 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.629845][T25510] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 265.647943][T25510] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/787/file0 supports timestamps until 2038 (0x7fffffff) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.690124][T25537] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.714205][T25543] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.733126][T25550] loop1: detected capacity change from 0 to 264192 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.761155][T25558] loop0: detected capacity change from 0 to 264192 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 265.816144][T25565] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.828097][T25558] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 265.852189][T25558] System zones: 1-2, 19-19, 35-38, 46-46 [ 265.859394][T25558] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 265.870476][T25558] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/788/file0 supports timestamps until 2038 (0x7fffffff) [ 265.880589][T25577] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x13}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.934377][T25583] loop1: detected capacity change from 0 to 264192 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.991082][T25591] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.043985][T25604] loop0: detected capacity change from 0 to 264192 [ 266.075156][T25604] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000004100100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.090582][T25614] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.105904][T25604] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/789/file0 supports timestamps until 2038 (0x7fffffff) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.207464][T25634] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.230056][T25639] loop1: detected capacity change from 0 to 264192 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.254352][T25647] loop0: detected capacity change from 0 to 264192 [ 266.255354][T25644] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.317300][T25647] EXT4-fs (loop0): inodes count not valid: 67108896 vs 32 01:01:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000020100100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.376761][T25668] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.392357][T25671] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.458188][T25682] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.474462][T25685] loop0: detected capacity change from 0 to 264192 [ 266.494126][T25692] loop1: detected capacity change from 0 to 264192 [ 266.501079][T25685] EXT4-fs (loop0): inodes count not valid: 536870944 vs 32 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.519815][T25699] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000110100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.630321][T25713] loop0: detected capacity change from 0 to 264192 [ 266.658259][T25713] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.684266][T25713] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/792/file0 supports timestamps until 2038 (0x7fffffff) [ 266.704454][T25727] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.707134][T25731] loop1: detected capacity change from 0 to 264192 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000120100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 266.739965][T25738] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.879468][T25762] loop0: detected capacity change from 0 to 264192 [ 266.914836][T25761] loop1: detected capacity change from 0 to 264192 [ 266.924415][T25764] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.955043][T25762] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.974897][T25781] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.005459][T25762] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/793/file0 supports timestamps until 2038 (0x7fffffff) 01:01:13 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000140100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.091377][T25799] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.135512][T25812] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.136276][T25809] loop1: detected capacity change from 0 to 264192 [ 267.147504][T25814] loop0: detected capacity change from 0 to 264192 [ 267.174173][T25814] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 267.192192][T25814] System zones: 1-2, 19-19, 35-38, 46-46 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.239754][T25823] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.240838][T25814] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 267.276732][T25830] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.332956][T25814] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/794/file0 supports timestamps until 2038 (0x7fffffff) [ 267.358087][T25846] loop1: detected capacity change from 0 to 264192 [ 267.372261][T25847] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002140100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.413915][T25854] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 267.471949][T25866] loop0: detected capacity change from 0 to 264192 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002150100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 267.528500][T25874] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.550898][T25866] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 [ 267.555560][T25883] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.601404][T25892] loop1: detected capacity change from 0 to 264192 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.646110][T25900] loop0: detected capacity change from 0 to 264192 [ 267.666579][T25902] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.672200][T25900] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002160100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 267.738034][T25918] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.834311][T25935] loop1: detected capacity change from 0 to 264192 [ 267.860483][T25941] loop0: detected capacity change from 0 to 264192 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002170100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 267.897704][T25941] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.013968][T25974] loop0: detected capacity change from 0 to 264192 [ 268.041742][T25983] loop1: detected capacity change from 0 to 264192 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.095193][T25974] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000180100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.258969][T26022] loop0: detected capacity change from 0 to 264192 [ 268.278456][T26029] loop1: detected capacity change from 0 to 264192 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.324614][T26022] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002180100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 268.366497][T26022] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/799/file0 supports timestamps until 2038 (0x7fffffff) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.510545][T26074] loop1: detected capacity change from 0 to 264192 [ 268.520851][T26075] loop0: detected capacity change from 0 to 264192 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.553592][T26075] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x56b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000190100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.712557][T26119] loop0: detected capacity change from 0 to 264192 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.764452][T26119] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 268.782594][T26137] loop1: detected capacity change from 0 to 264192 [ 268.794904][T26119] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/801/file0 supports timestamps until 2038 (0x7fffffff) 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002190100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.944280][T26166] loop0: detected capacity change from 0 to 264192 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.989535][T26182] loop1: detected capacity change from 0 to 264192 [ 269.008469][T26166] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000021a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 269.093649][T26194] loop1: detected capacity change from 0 to 264192 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.181380][T26209] loop0: detected capacity change from 0 to 264192 [ 269.205257][T26209] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 [ 269.213775][T26221] loop1: detected capacity change from 0 to 264192 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.285733][T26234] loop0: detected capacity change from 0 to 264192 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.330952][T26234] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 269.358203][T26234] System zones: 1-2, 19-19, 35-38, 46-46 [ 269.364452][T26234] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000010200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 269.381446][T26234] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/804/file0 supports timestamps until 2038 (0x7fffffff) [ 269.409256][T26252] loop1: detected capacity change from 0 to 264192 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.564960][T26271] loop0: detected capacity change from 0 to 264192 [ 269.586469][T26271] EXT4-fs (loop0): inodes count not valid: 268435488 vs 32 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.617168][T26293] loop1: detected capacity change from 0 to 264192 01:01:15 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000220100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1d0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.778258][T26325] loop1: detected capacity change from 0 to 264192 [ 269.785899][T26333] loop0: detected capacity change from 0 to 264192 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.854143][T26333] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 269.899691][T26333] System zones: 1-2, 19-19, 35-38, 46-46 [ 269.933559][T26333] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 269.942306][T26362] loop1: detected capacity change from 0 to 264192 [ 269.945180][T26333] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/806/file0 supports timestamps until 2038 (0x7fffffff) 01:01:16 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000250100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x22e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.074121][T26388] loop0: detected capacity change from 0 to 264192 [ 270.109722][T26396] loop1: detected capacity change from 0 to 264192 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.131226][T26388] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 270.187532][T26388] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/807/file0 supports timestamps until 2038 (0x7fffffff) 01:01:16 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.327190][T26438] loop0: detected capacity change from 0 to 264192 [ 270.334138][T26440] loop1: detected capacity change from 0 to 264192 [ 270.363763][T26438] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.426607][T26438] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/808/file0 supports timestamps until 2038 (0x7fffffff) 01:01:16 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000003f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.560792][T26483] loop1: detected capacity change from 0 to 264192 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) [ 270.613044][T26499] loop0: detected capacity change from 0 to 264192 01:01:16 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000400100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.668782][T26499] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 270.695486][T26499] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/809/file0 supports timestamps until 2038 (0x7fffffff) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.741282][T26516] loop1: detected capacity change from 0 to 264192 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.798094][T26534] loop0: detected capacity change from 0 to 264192 01:01:16 executing program 1: shmctl$IPC_STAT(0xffffffffffffffff, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001140), 0xffffffffffffffff) getrandom(&(0x7f0000001bc0)=""/4096, 0x1000, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000460100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.894385][T26534] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 270.912659][T26534] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/810/file0 supports timestamps until 2038 (0x7fffffff) 01:01:17 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)={[{@nocompress}, {@map_acorn}]}) 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000470100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.092451][T26590] ISOFS: Unable to identify CD-ROM format. [ 271.125932][T26604] loop0: detected capacity change from 0 to 264192 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.140981][T26590] ISOFS: Unable to identify CD-ROM format. 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x54000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6_vti0\x00', 0x0}) [ 271.186124][T26604] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 271.213140][T26604] System zones: 1-2, 19-19, 35-38, 46-46 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000480100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x56b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x1, @link_local}, 0x0, {0x2, 0x0, @loopback}, 'veth0_to_batadv\x00'}) [ 271.259389][T26604] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 271.288397][T26604] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/812/file0 supports timestamps until 2038 (0x7fffffff) 01:01:17 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000003600), 0x0, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.356761][T26655] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:17 executing program 1: r0 = getpid() r1 = getpid() r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000000c0)={r3}) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.417526][T26668] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.420574][T26670] loop0: detected capacity change from 0 to 264192 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000490100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000640)={0x48, 0x3, 0x1, 0x3, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}]}, 0x48}}, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.496269][T26670] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 271.508677][T26670] System zones: 1-2, 19-19, 35-38, 46-46 [ 271.517678][T26670] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 271.529015][T26670] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/813/file0 supports timestamps until 2038 (0x7fffffff) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.597182][T26701] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.636575][T26705] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:17 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000040)=""/228, 0xe4) read$char_usb(r0, 0x0, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.663842][T26714] loop0: detected capacity change from 0 to 264192 [ 271.703898][T26714] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 271.724115][T26714] System zones: 1-2, 19-19, 35-38, 46-46 [ 271.740193][T26714] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 271.747517][T26731] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.760722][T26714] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/814/file0 supports timestamps until 2038 (0x7fffffff) 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='limits\x00') read$char_raw(r0, 0x0, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x105400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.802455][T26740] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:17 executing program 1: timer_create(0x0, &(0x7f0000001240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.874103][T26757] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.910365][T26763] loop0: detected capacity change from 0 to 264192 01:01:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000000)={'macvlan0\x00', @ifru_addrs=@ethernet={0x0, @random}}) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.928934][T26767] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.966229][T26763] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004b0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000002900)={0x0, 0x0, &(0x7f00000028c0)={&(0x7f0000002880)={0x14, 0x1, 0x8, 0x101}, 0x14}}, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.997349][T26763] System zones: 1-2, 19-19, 35-38, 46-46 [ 272.019220][T26763] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 272.030021][T26763] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/815/file0 supports timestamps until 2038 (0x7fffffff) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.092527][T26797] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.122418][T26809] loop0: detected capacity change from 0 to 264192 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f00000020c0)={0x20, 0x0, 0x7, 0x3, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.134122][T26812] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2e02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = epoll_create(0x9b0a) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x4}) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.215212][T26809] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 272.248752][T26809] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/816/file0 supports timestamps until 2038 (0x7fffffff) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000600100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000)='=', 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002840)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000040)=""/23, 0x17}, {&(0x7f0000000200)=""/129, 0x81}, {&(0x7f00000002c0)=""/159, 0x9f}, {&(0x7f0000002800)=""/15}], 0x4, &(0x7f00000003c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000440)=""/118, 0xffffffffffffffa1}, {&(0x7f00000004c0)=""/204, 0xcc}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/22, 0x16}, {&(0x7f0000002600)=""/104, 0x68}, {&(0x7f0000002680)=""/23, 0x17}, {&(0x7f00000026c0)=""/141, 0x8d}], 0x8, &(0x7f0000002800)}}], 0x2, 0x0, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4af000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.345627][T26854] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.402909][T26870] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.414744][T26868] loop0: detected capacity change from 0 to 264192 [ 272.438988][T26868] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4fd000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: socket(0x1, 0x0, 0x5120) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000680100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.484607][T26868] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/818/file0 supports timestamps until 2038 (0x7fffffff) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.543538][T26891] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x541000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x21, 0x0, &(0x7f0000000480)) [ 272.589114][T26907] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.623669][T26912] loop0: detected capacity change from 0 to 264192 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.676543][T26912] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001c80)) [ 272.716839][T26912] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/819/file0 supports timestamps until 2038 (0x7fffffff) 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x550000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.760966][T26938] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.789145][T26947] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x610002, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x570000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.836794][T26955] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.857732][T26956] loop0: detected capacity change from 0 to 264192 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x970000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffe) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb402}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.885452][T26963] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.923253][T26956] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:19 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000740100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb456}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd04f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.986661][T26956] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/820/file0 supports timestamps until 2038 (0x7fffffff) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='net/vlan/vlan0\x00') 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.064113][T27002] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 273.102111][T27013] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf04a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000001dc0)='ns/pid\x00') ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) [ 273.130660][T27018] loop0: detected capacity change from 0 to 264192 [ 273.156366][T27018] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0ff1f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.176048][T27018] System zones: 1-2, 19-19, 35-38, 46-46 [ 273.201108][T27018] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 273.234050][T27037] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 273.254285][T27018] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/821/file0 supports timestamps until 2038 (0x7fffffff) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: mq_open(&(0x7f00000007c0)='ip6tnl0\x00', 0x0, 0x0, 0x0) 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002750100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 273.275119][T27045] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.352149][T27061] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.395694][T27064] loop0: detected capacity change from 0 to 264192 [ 273.406338][T27074] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 273.428609][T27064] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:19 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0xc, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.495620][T27085] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 273.519655][T27089] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000001c80)='ns/uts\x00') 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.569246][T27102] loop0: detected capacity change from 0 to 264192 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.613539][T27102] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 273.621973][T27102] System zones: 1-2, 19-19, 35-38, 46-46 [ 273.636110][T27102] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 273.639231][T27118] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x713180, 0x0) 01:01:19 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000018a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 273.652306][T27102] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/823/file0 supports timestamps until 2038 (0x7fffffff) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3045000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: clone(0x4008000, 0x0, 0x0, 0x0, 0x0) [ 273.707376][T27128] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.784043][T27142] loop0: detected capacity change from 0 to 264192 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: getrusage(0x0, &(0x7f0000001c80)) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.847943][T27142] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: unlinkat(0xffffffffffffff9c, &(0x7f0000001c80)='./file0\x00', 0x200) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.970627][T27183] loop0: detected capacity change from 0 to 264192 [ 274.009548][T27183] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: mq_notify(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x2, @thr={0x0, 0x0}}) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.070976][T27183] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/825/file0 supports timestamps until 2038 (0x7fffffff) 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x6e6bbb}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, 0xe8) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.226496][T27241] loop0: detected capacity change from 0 to 264192 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.290099][T27241] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 274.310920][T27241] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/826/file0 supports timestamps until 2038 (0x7fffffff) 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000900100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000004c0)) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: io_setup(0xe63c, &(0x7f0000000000)) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.475022][T27288] loop0: detected capacity change from 0 to 264192 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.528941][T27288] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000910100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.569248][T27288] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/827/file0 supports timestamps until 2038 (0x7fffffff) 01:01:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xff) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000dc0)='attr/keycreate\x00') write$tcp_congestion(r0, 0x0, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.696260][T27341] loop0: detected capacity change from 0 to 264192 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.748321][T27341] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000920100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 1: socketpair(0xa, 0x3, 0x7b, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.798492][T27341] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/828/file0 supports timestamps until 2038 (0x7fffffff) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: capget(0x0, &(0x7f0000000140)) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.919608][T27390] loop0: detected capacity change from 0 to 264192 01:01:21 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000001040)='/sys/kernel/rcu_normal', 0x4000, 0x0) [ 274.983264][T27390] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 275.015955][T27390] System zones: 1-2, 19-19, 35-38, 46-46 [ 275.022314][T27390] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e40100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$P9_RFSYNC(r0, &(0x7f0000000140)={0x7}, 0xfffffd40) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.033224][T27390] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/829/file0 supports timestamps until 2038 (0x7fffffff) 01:01:21 executing program 1: r0 = socket(0x11, 0xa, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000200), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.121042][T27428] loop0: detected capacity change from 0 to 264192 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.172048][T27428] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e60100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast2, @private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000008}) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.307542][T27469] loop0: detected capacity change from 0 to 264192 [ 275.344967][T27469] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:21 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e70100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x13000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: capget(&(0x7f0000000100)={0x20080522}, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ffff000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.483125][T27515] loop0: detected capacity change from 0 to 264192 01:01:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 275.537028][T27515] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e80100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4f847b6caee3aef1, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mbind(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x0, 0x0, 0x0, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x21000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.687489][T27558] loop0: detected capacity change from 0 to 264192 [ 275.714228][T27558] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:21 executing program 1: r0 = fork() waitid(0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)) rt_sigqueueinfo(r0, 0xf, &(0x7f0000000100)={0x0, 0x0, 0xfffff001}) 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e90100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.829643][T27586] loop0: detected capacity change from 0 to 264192 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}}, &(0x7f0000000100)) [ 275.901988][T27586] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000008, 0xffffffffffffffff) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001ea0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: clock_settime(0x0, &(0x7f0000001200)) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000)="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", 0xffffffffffffff78, 0x200040c4, 0x0, 0x0) [ 276.058203][T27636] loop0: detected capacity change from 0 to 264192 [ 276.087387][T27636] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: set_mempolicy(0x8001, &(0x7f0000000000)=0x2, 0x401) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001eb0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}}, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002180)={{{@in6=@empty, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @dev}}}, 0xe8) [ 276.235619][T27674] loop0: detected capacity change from 0 to 264192 [ 276.263119][T27674] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000fff0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000011c0)) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.379065][T27707] loop0: detected capacity change from 0 to 264192 01:01:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, 0x0, 0xfffffffffffffd41) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.435422][T27707] EXT4-fs (loop0): inodes count not valid: 251658272 vs 32 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.600009][T27747] loop0: detected capacity change from 0 to 264192 01:01:22 executing program 1: r0 = epoll_create1(0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xb0000006}) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.646683][T27747] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 276.711081][T27747] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/838/file0 supports timestamps until 2038 (0x7fffffff) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000020400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x1, 0x7, 0x101}, 0x14}}, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='reno\x00', 0x1) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.884073][T27813] loop0: detected capacity change from 0 to 264192 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000001000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.929927][T27813] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 276.965788][T27813] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/839/file0 supports timestamps until 2038 (0x7fffffff) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: epoll_create(0x4) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: clock_adjtime(0x0, &(0x7f0000000100)={0x7ff}) [ 277.094541][T27862] loop0: detected capacity change from 0 to 264192 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000002000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, r0+60000000}}, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.152756][T27862] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/nfsfs\x00') 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.276132][T27902] loop0: detected capacity change from 0 to 264192 [ 277.311622][T27902] EXT4-fs (loop0): inodes count not valid: 32 vs 512 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000003000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000100)=""/4096, 0x1000) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = socket(0xa, 0x2, 0x0) bind$unix(r0, 0x0, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.426219][T27935] loop0: detected capacity change from 0 to 264192 [ 277.452340][T27935] EXT4-fs (loop0): bad geometry: block count 196608 exceeds size of device (132096 blocks) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000004000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) mq_open(&(0x7f0000000080)=',\x00', 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001640)='net/packet\x00') 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001e80)={&(0x7f0000001e00)={0x1c, 0x8, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 277.600289][T27974] loop0: detected capacity change from 0 to 264192 [ 277.626377][T27974] EXT4-fs (loop0): bad geometry: block count 262144 exceeds size of device (132096 blocks) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2e020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000005000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x4, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 01:01:23 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/ipv6_route\x00') 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x56b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.786029][T28015] loop0: detected capacity change from 0 to 264192 [ 277.809171][T28015] EXT4-fs (loop0): bad geometry: block count 327680 exceeds size of device (132096 blocks) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000013000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 1: r0 = socket(0x10, 0x2, 0x0) connect$unix(r0, &(0x7f0000002a80)=@abs, 0x6e) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.940608][T28048] loop0: detected capacity change from 0 to 264192 [ 277.969518][T28048] EXT4-fs (loop0): bad geometry: block count 1245184 exceeds size of device (132096 blocks) 01:01:24 executing program 1: clone(0xa0061200, 0x0, 0x0, 0x0, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000000008b000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.129558][T28088] loop0: detected capacity change from 0 to 264192 [ 278.153143][T28088] EXT4-fs (loop0): bad geometry: block count 9109504 exceeds size of device (132096 blocks) 01:01:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x2, 0x7, 0x301}, 0x14}}, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000000008c000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: r0 = socket(0xa, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x6060, 0x0, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x54b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.309684][T28126] loop0: detected capacity change from 0 to 264192 [ 278.347223][T28126] EXT4-fs (loop0): bad geometry: block count 9175040 exceeds size of device (132096 blocks) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: uname(&(0x7f0000000140)=""/177) io_setup(0x0, &(0x7f0000000200)) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000000008d000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/slabinfo\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000040)=""/214, 0xfffffd73) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b33a20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='ns\x00') getdents64(r0, &(0x7f00000000c0)=""/4096, 0x1000) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.514089][T28179] loop0: detected capacity change from 0 to 264192 [ 278.531768][T28179] EXT4-fs (loop0): bad geometry: block count 9240576 exceeds size of device (132096 blocks) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000092000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='ns\x00') getdents64(r0, &(0x7f00000000c0)=""/4096, 0x1000) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.675959][T28206] loop0: detected capacity change from 0 to 264192 01:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='ns\x00') getdents64(r0, &(0x7f00000000c0)=""/4096, 0x1000) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.719093][T28206] EXT4-fs (loop0): bad geometry: block count 9568256 exceeds size of device (132096 blocks) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000020000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='ns\x00') getdents64(r0, &(0x7f00000000c0)=""/4096, 0x1000) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000340)="d7b03c18eaa371453f85311d84086e83", 0x10) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.886845][T28248] loop0: detected capacity change from 0 to 264192 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.937607][T28248] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 278.947856][T28248] EXT4-fs (loop0): group descriptors corrupted! 01:01:25 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x4000000) 01:01:25 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000030000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x550000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendto$unix(r0, &(0x7f0000000180)="04", 0x1, 0x0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg(r0, &(0x7f00000012c0)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x570000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.120117][T28300] loop0: detected capacity change from 0 to 264192 [ 279.137704][T28300] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 279.147931][T28300] EXT4-fs (loop0): group descriptors corrupted! 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000040000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f141457a000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x2, 0x9, 0x301}, 0x14}}, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f141457b000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x14, 0x3, 0x1, 0x801}, 0x14}}, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f141459b000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.321634][T28337] loop0: detected capacity change from 0 to 264192 [ 279.353607][T28337] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 279.364009][T28337] EXT4-fs (loop0): group descriptors corrupted! 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000050000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000001900)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f141459c000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd0010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.517069][T28385] loop0: detected capacity change from 0 to 264192 [ 279.553675][T28385] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f14145bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) [ 279.563929][T28385] EXT4-fs (loop0): group descriptors corrupted! 01:01:25 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000130000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f14147bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000001180)=@file={0x1, './file0\x00'}, 0x6e) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f14149bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x970000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: clone(0x90126500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fallocate(r0, 0x0, 0x102000006, 0x6) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = getpid() tkill(r1, 0x37) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.762771][T28432] loop0: detected capacity change from 0 to 264192 [ 279.805703][T28432] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 279.816025][T28432] EXT4-fs (loop0): group descriptors corrupted! [ 279.848640][ T25] audit: type=1400 audit(1626138085.932:64): avc: denied { sys_admin } for pid=28444 comm="syz-executor.1" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa2331b000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="85", 0x1}, {0x0}], 0x2}, 0x0) [ 279.883547][ T25] audit: type=1400 audit(1626138085.962:65): avc: denied { dac_read_search } for pid=28461 comm="syz-executor.1" capability=2 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 279.911143][ T25] audit: type=1400 audit(1626138085.962:66): avc: denied { dac_override } for pid=28461 comm="syz-executor.1" capability=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: recvfrom$unix(0xffffffffffffffff, &(0x7f00000010c0)=""/4096, 0xfffffffffffffe53, 0x0, &(0x7f0000001040)=@file={0x0, './file0\x00'}, 0xffffffffffffffa9) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.002299][T28484] loop0: detected capacity change from 0 to 264192 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.051539][T28484] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 280.072450][T28484] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/855/file0 supports timestamps until 2038 (0x7fffffff) 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008b0000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:26 executing program 1: socket$packet(0x11, 0x4a133f06379f9d3d, 0x300) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = open(&(0x7f0000000280)='./file0\x00', 0x200, 0x0) close(r0) [ 280.203691][T28532] loop0: detected capacity change from 0 to 264192 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.245372][T28532] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 280.276939][T28532] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/856/file0 supports timestamps until 2038 (0x7fffffff) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008c0000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:26 executing program 1: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x100000001}, 0x0, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.304608][T28554] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.335681][T28560] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) poll(&(0x7f00000000c0)=[{r0, 0x4}], 0x1, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10400000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001080), 0x2) [ 280.407257][T28579] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.438697][T28588] loop0: detected capacity change from 0 to 264192 [ 280.446379][T28591] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.476127][T28588] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10540000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r0) getsockname$inet6(r0, 0x0, 0x0) 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008d0000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 280.533000][T28588] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/857/file0 supports timestamps until 2038 (0x7fffffff) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.581116][T28616] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:26 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(r0, 0x0, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb454}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.633214][T28622] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.651369][T28634] loop0: detected capacity change from 0 to 264192 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb458}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.680508][T28634] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, 0x0, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000920000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.722541][T28634] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/858/file0 supports timestamps until 2038 (0x7fffffff) 01:01:26 executing program 1: pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0x8, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.800543][T28669] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x50040300000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.847508][T28681] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.860216][T28683] loop0: detected capacity change from 0 to 264192 01:01:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0xf61fe44bff3c9334, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa05714147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.902634][T28693] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.926693][T28683] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.941977][T28683] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/859/file0 supports timestamps until 2038 (0x7fffffff) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: setitimer(0x0, &(0x7f00000000c0)={{}, {0x0, 0xfffffffffffff4f2}}, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb05714147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.981122][T28709] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000004000)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.033994][T28722] loop0: detected capacity change from 0 to 264192 [ 281.065920][T28722] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000030100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb05914147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.084784][T28722] System zones: 1-2, 19-19, 35-38, 46-46 [ 281.094436][T28722] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.106969][T28722] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/860/file0 supports timestamps until 2038 (0x7fffffff) [ 281.113700][T28739] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r1, r0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.178624][T28739] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000040)=@in, 0xc) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc05914147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.221889][T28758] loop0: detected capacity change from 0 to 264192 [ 281.246147][T28762] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.258794][T28758] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.295230][T28758] System zones: 1-2, 19-19, 35-38, 46-46 [ 281.307126][T28758] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.318453][T28758] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/861/file0 supports timestamps until 2038 (0x7fffffff) 01:01:27 executing program 1: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1011, 0xffffffffffffff9c, 0x0) 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000040100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.338330][T28779] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc05b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) lseek(r0, 0x0, 0x0) [ 281.416761][T28796] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.424781][T28795] loop0: detected capacity change from 0 to 264192 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc07b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000040)=[{0x0}], 0x1) r1 = getgid() fchown(r0, 0xffffffffffffffff, r1) [ 281.465257][T28795] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 281.493960][T28812] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000050100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 281.510605][T28795] System zones: 1-2, 19-19, 35-38, 46-46 [ 281.519274][T28795] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.530608][T28795] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/862/file0 supports timestamps until 2038 (0x7fffffff) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc09b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000004040), 0x10) [ 281.578344][T28828] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.591445][T28832] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd04f0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.651070][T28846] loop0: detected capacity change from 0 to 264192 01:01:27 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCMSET(r0, 0x8004746d, &(0x7f0000000300)) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.694807][T28858] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.697497][T28846] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 281.718888][T28863] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf04a0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000060100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:27 executing program 1: pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0ff1f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.791553][T28846] System zones: 1-2, 19-19, 35-38, 46-46 [ 281.797907][T28846] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.811058][T28846] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/863/file0 supports timestamps until 2038 (0x7fffffff) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.878214][T28896] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.922727][T28899] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.939860][T28908] loop0: detected capacity change from 0 to 264192 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000070100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000740)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.975714][T28908] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.998414][T28908] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/864/file0 supports timestamps until 2038 (0x7fffffff) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000040)=[{0x0}], 0x1) fchown(r0, 0xffffffffffffffff, 0x0) [ 282.072016][T28936] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.104020][T28934] loop0: detected capacity change from 0 to 264192 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: poll(0x0, 0x0, 0x2) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.132370][T28946] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.173989][T28934] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000080100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup2(r1, r0) [ 282.217895][T28934] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/865/file0 supports timestamps until 2038 (0x7fffffff) [ 282.232825][T28968] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(r0, 0x0, 0x0) [ 282.279185][T28978] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@cred], 0x20}, 0x0) [ 282.343113][T28993] loop0: detected capacity change from 0 to 264192 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000090100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x100, 0x0, 0x0) [ 282.397481][T28993] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 282.418285][T28993] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/866/file0 supports timestamps until 2038 (0x7fffffff) [ 282.420765][T29014] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 1: writev(0xffffffffffffffff, &(0x7f0000001080), 0x2) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.478833][T29018] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='%', 0x1}], 0x4}, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.548121][T29036] loop0: detected capacity change from 0 to 264192 [ 282.553697][T29044] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.582376][T29036] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.625899][T29036] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/867/file0 supports timestamps until 2038 (0x7fffffff) [ 282.657239][T29060] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) [ 282.714128][T29077] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.735152][T29082] loop0: detected capacity change from 0 to 264192 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: clock_getres(0x636de1c172a9d307, 0x0) [ 282.760970][T29087] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.775926][T29082] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000b0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.817279][T29082] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/868/file0 supports timestamps until 2038 (0x7fffffff) 01:01:28 executing program 1: semctl$SETVAL(0x0, 0x0, 0x8, &(0x7f0000000180)) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.885369][T29109] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.897749][T29113] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x10004) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/185, 0xb9}], 0x1) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.960965][T29128] loop0: detected capacity change from 0 to 264192 [ 282.982106][T29128] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 282.994541][T29128] System zones: 1-2, 19-19, 35-38, 46-46 01:01:29 executing program 1: select(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) [ 283.017293][T29128] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 283.018127][T29138] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.028423][T29128] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/869/file0 supports timestamps until 2038 (0x7fffffff) 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7}, &(0x7f0000000140)) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.124332][T29157] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f00000002c0)=[{&(0x7f0000000080)="fa164fbfda20a3665d186c4a53aa1b47d8fdc40b5d4750b1a9ef1e", 0x1b}, {&(0x7f00000000c0)="b6d3bc897d5a431e6d3159ce669758c13e56085e73d206bdb3ef1956c6dc801a660daa25cd2fb892575b5d13dd80c2a338b4227de1cf3642f3f97abbb36d1a651f6257114a6a5da1cb991ec50a811fd96cda56a94f80c4b50a3b5921fd443472e469ae56b9ceca82306e8403973b599938b596847666", 0x76}, {0x0}, {&(0x7f00000001c0)='%', 0x1}], 0x4, &(0x7f0000000340)=[@cred], 0x20}, 0x3) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x56b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.195481][T29174] loop0: detected capacity change from 0 to 264192 [ 283.223978][T29184] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.267817][T29174] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 283.280281][T29174] System zones: 1-2, 19-19, 35-38, 46-46 [ 283.300178][T29174] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000d0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.300470][T29198] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.311264][T29174] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/870/file0 supports timestamps until 2038 (0x7fffffff) 01:01:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)="fa", 0x1}, {0x0}, {&(0x7f00000001c0)='%', 0x1}], 0x3}, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@in={0x2, 0x3}, 0xc) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.414693][T29216] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.428172][T29224] loop0: detected capacity change from 0 to 264192 [ 283.439867][T29228] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.501197][T29224] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 283.516543][T29224] System zones: 1-2, 19-19, 35-38, 46-46 [ 283.536754][T29224] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 1: semget(0x2, 0x2, 0x755) 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000), 0x10) [ 283.557703][T29224] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/871/file0 supports timestamps until 2038 (0x7fffffff) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00\xddu\x8b\x95\x9c#\xa4\x13\x1e\x04G}\xa8\xeb\xf7\xcf\xbfT\xbf7\x108\x8d\x16\xe7\x91=\x90\xe6J\x8c\xad\x81\xf3\xb8i\x1b\x96=0\xf0,\xea\x03-\x15j\bQA\x92#\xdcF\x03i\x90x\xd3\xffY\x15]\x00\xd4\xc0\xcf\xc0\xebu\xdb\xc3o\xc1\xadu\xa6\xd69Wi\x17\xa6\x0e\xd65\xa0\xe6\"\xc9\xa3V\xbe`\xceV\xc0\xef\xc4\xe8\xbd\x81\xe6\xca\x0etQ\x8b .t\x01\'1o\xe4\x03SY\xc8U\xfbW\x9cG\x8dM\xbcn\xc2\'Y\r\xbc/\xfe\xfeh\x84}\xaef\x87x\xf3Ob\x1b\x85\x8a*{\x1d', 0x5) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) ftruncate(r0, 0x1000000) mmap(&(0x7f000074a000/0x2000)=nil, 0x2000, 0x3000006, 0x10, r0, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.639214][T29266] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00\xddu\x8b\x95\x9c#\xa4\x13\x1e\x04G}\xa8\xeb\xf7\xcf\xbfT\xbf7\x108\x8d\x16\xe7\x91=\x90\xe6J\x8c\xad\x81\xf3\xb8i\x1b\x96=0\xf0,\xea\x03-\x15j\bQA\x92#\xdcF\x03i\x90x\xd3\xffY\x15]\x00\xd4\xc0\xcf\xc0\xebu\xdb\xc3o\xc1\xadu\xa6\xd69Wi\x17\xa6\x0e\xd65\xa0\xe6\"\xc9\xa3V\xbe`\xceV\xc0\xef\xc4\xe8\xbd\x81\xe6\xca\x0etQ\x8b .t\x01\'1o\xe4\x03SY\xc8U\xfbW\x9cG\x8dM\xbcn\xc2\'Y\r\xbc/\xfe\xfeh\x84}\xaef\x87x\xf3Ob\x1b\x85\x8a*{\x1d', 0x5) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) ftruncate(r0, 0x1000000) mmap(&(0x7f000074a000/0x2000)=nil, 0x2000, 0x3000006, 0x10, r0, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.698652][T29275] loop0: detected capacity change from 0 to 264192 [ 283.711003][T29278] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.735176][T29275] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: r0 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000040)='source', &(0x7f0000000080)='[\x9d.{+-:\x00', 0xffffffff00000000) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.758200][T29275] System zones: 1-2, 19-19, 35-38, 46-46 [ 283.766838][T29275] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 283.779215][T29275] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/873/file0 supports timestamps until 2038 (0x7fffffff) 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000100100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x54, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x54}}, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.851887][T29310] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.868254][T29314] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.921416][T29331] loop0: detected capacity change from 0 to 264192 [ 283.954625][T29331] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: r0 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000040)='source', &(0x7f0000000080)='[\x9d.{+-:\x00', 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.981071][T29331] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/874/file0 supports timestamps until 2038 (0x7fffffff) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000110100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 284.021686][T29346] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140)) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.076330][T29365] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.134884][T29368] loop0: detected capacity change from 0 to 264192 [ 284.148244][T29381] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}, 0x0) 01:01:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000040)='source', &(0x7f0000000080)='[\x9d.{+-:\x00', 0x0) 01:01:30 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000120100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 284.174795][T29368] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 284.192183][T29368] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/875/file0 supports timestamps until 2038 (0x7fffffff) [ 284.222462][T29387] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2e02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x48, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) [ 284.315558][T29410] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 284.332100][T29420] loop0: detected capacity change from 0 to 264192 [ 284.347054][T29426] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.359577][T29420] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.413841][T29420] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/876/file0 supports timestamps until 2038 (0x7fffffff) 01:01:30 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002cbd7000000000001f0000", @ANYRES32=r3], 0x24}}, 0x0) 01:01:30 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000140100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.486317][T29454] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.527375][T29462] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.580982][T29458] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 284.599543][T29478] loop0: detected capacity change from 0 to 264192 [ 284.614192][T29486] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.641756][T29478] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 284.663735][T29478] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/877/file0 supports timestamps until 2038 (0x7fffffff) [ 284.676457][T29500] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00\xddu\x8b\x95\x9c#\xa4\x13\x1e\x04G}\xa8\xeb\xf7\xcf\xbfT\xbf7\x108\x8d\x16\xe7\x91=\x90\xe6J\x8c\xad\x81\xf3\xb8i\x1b\x96=0\xf0,\xea\x03-\x15j\bQA\x92#\xdcF\x03i\x90x\xd3\xffY\x15]\x00\xd4\xc0\xcf\xc0\xebu\xdb\xc3o\xc1\xadu\xa6\xd69Wi\x17\xa6\x0e\xd65\xa0\xe6\"\xc9\xa3V\xbe`\xceV\xc0\xef\xc4\xe8\xbd\x81\xe6\xca\x0etQ\x8b .t\x01\'1o\xe4\x03SY\xc8U\xfbW\x9cG\x8dM\xbcn\xc2\'Y\r\xbc/\xfe\xfeh\x84}\xaef\x87x\xf3Ob\x1b\x85\x8a*{\x1d', 0x5) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) ftruncate(r0, 0x1000000) mmap(&(0x7f000074a000/0x2000)=nil, 0x2000, 0x3000006, 0x10, r0, 0x0) 01:01:30 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000180100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.712141][T29508] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.777208][T29518] loop0: detected capacity change from 0 to 264192 01:01:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(0xffffffffffffffff, r2, 0x0) dup3(r1, r0, 0x0) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.816836][T29530] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 284.844633][T29518] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.871063][T29536] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 284.888126][T29518] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/878/file0 supports timestamps until 2038 (0x7fffffff) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000190100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x54b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.954174][T29554] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.011478][T29565] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.058689][T29573] loop0: detected capacity change from 0 to 264192 [ 285.093167][T29580] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.107468][T29573] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 285.116601][T29573] System zones: 1-2, 19-19, 35-38, 46-46 [ 285.123110][T29585] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.144164][T29573] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 285.169159][T29573] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/879/file0 supports timestamps until 2038 (0x7fffffff) 01:01:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(0xffffffffffffffff, r2, 0x0) dup3(r1, r0, 0x0) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000220100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.248646][T29598] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.287845][T29607] loop0: detected capacity change from 0 to 264192 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.295139][T29611] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.319711][T29607] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 285.331391][T29607] System zones: 1-2, 19-19, 35-38, 46-46 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.355663][T29607] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.405683][T29628] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 1: r0 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00\xddu\x8b\x95\x9c#\xa4\x13\x1e\x04G}\xa8\xeb\xf7\xcf\xbfT\xbf7\x108\x8d\x16\xe7\x91=\x90\xe6J\x8c\xad\x81\xf3\xb8i\x1b\x96=0\xf0,\xea\x03-\x15j\bQA\x92#\xdcF\x03i\x90x\xd3\xffY\x15]\x00\xd4\xc0\xcf\xc0\xebu\xdb\xc3o\xc1\xadu\xa6\xd69Wi\x17\xa6\x0e\xd65\xa0\xe6\"\xc9\xa3V\xbe`\xceV\xc0\xef\xc4\xe8\xbd\x81\xe6\xca\x0etQ\x8b .t\x01\'1o\xe4\x03SY\xc8U\xfbW\x9cG\x8dM\xbcn\xc2\'Y\r\xbc/\xfe\xfeh\x84}\xaef\x87x\xf3Ob\x1b\x85\x8a*{\x1d', 0x5) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) ftruncate(r0, 0x1000000) mmap(&(0x7f000074a000/0x2000)=nil, 0x2000, 0x3000006, 0x10, r0, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb456}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.441707][T29607] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/880/file0 supports timestamps until 2038 (0x7fffffff) 01:01:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r0, &(0x7f00000012c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000001340)=0x80) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, 0x0) 01:01:31 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000250100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.484519][T29636] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb458}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 1: syz_mount_image$tmpfs(&(0x7f0000001dc0), &(0x7f0000001e00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000031c0)={[{@size}]}) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.548302][T29656] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.584541][T29663] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.615404][T29671] tmpfs: Bad value for 'size' 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.640513][T29676] loop0: detected capacity change from 0 to 264192 [ 285.651549][T29671] tmpfs: Bad value for 'size' [ 285.669605][T29676] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x15, 0x0, &(0x7f00000002c0)) [ 285.680974][T29681] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.686982][T29676] System zones: 1-2, 19-19, 35-38, 46-46 [ 285.715415][T29676] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:31 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000380)) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.736801][T29694] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.766760][T29676] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/881/file0 supports timestamps until 2038 (0x7fffffff) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.839782][T29715] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.879427][T29726] loop0: detected capacity change from 0 to 264192 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000500), &(0x7f0000000540)={0x8}, 0x0, 0x0, 0x0) [ 285.886267][T29727] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.935950][T29726] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 285.981258][T29726] System zones: 1-2, 19-19, 35-38, 46-46 [ 286.002127][T29726] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000460100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@broadcast, @local}, 0xc) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) socketpair(0x11, 0x2, 0x9, 0x0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.018567][T29726] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/882/file0 supports timestamps until 2038 (0x7fffffff) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd001000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.074600][T29765] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.112462][T29773] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.124379][T29778] loop0: detected capacity change from 0 to 264192 [ 286.185188][T29778] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 286.203498][T29796] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.218020][T29778] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/883/file0 supports timestamps until 2038 (0x7fffffff) 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000470100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {0x0}], 0x2}, 0x0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.251187][T29802] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f000000ff80), 0x0, 0x0) timerfd_gettime(r0, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.322061][T29820] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.346637][T29817] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.359522][T29821] loop0: detected capacity change from 0 to 264192 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000480100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:32 executing program 1: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x1000000) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.374693][T29821] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/884/file0 supports timestamps until 2038 (0x7fffffff) [ 286.389867][T29831] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.412107][T29834] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x9}, 0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.482556][T29847] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.497774][T29852] loop0: detected capacity change from 0 to 264192 [ 286.520644][T29850] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000700)='/sys/block/loop0', 0x305000, 0x0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000490100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 286.546927][T29860] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.558869][T29852] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/885/file0 supports timestamps until 2038 (0x7fffffff) [ 286.581523][T29867] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000300)=@buf={0x0, &(0x7f00000002c0)}) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000dc0)={&(0x7f0000000b40), 0xc, &(0x7f0000000d80)={&(0x7f0000000440)={0xa8, r1, 0x701, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x4}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0xe, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS]}]}, 0xa8}}, 0x0) [ 286.633566][T29874] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.663722][T29884] loop0: detected capacity change from 0 to 264192 [ 286.670687][T29881] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.698732][T29884] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/886/file0 supports timestamps until 2038 (0x7fffffff) [ 286.719189][T29891] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.755424][T29894] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, 0x0, 0x0, r0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004b0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 286.805039][T29907] loop0: detected capacity change from 0 to 264192 [ 286.821832][T29907] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/887/file0 supports timestamps until 2038 (0x7fffffff) [ 286.837032][T29914] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000500)) [ 286.868502][T29920] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.906173][T29921] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.919809][T29928] loop0: detected capacity change from 0 to 264192 [ 286.939870][T29935] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.966191][T29941] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.967331][T29928] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/888/file0 supports timestamps until 2038 (0x7fffffff) [ 286.997459][T29944] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000d00)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000cc0)={0x0}}, 0x0) 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) gettid() timer_create(0x8, 0x0, &(0x7f0000000040)) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.073799][T29950] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.118065][T29962] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) [ 287.172822][T29983] loop0: detected capacity change from 0 to 264192 [ 287.178031][T29982] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.209412][T29983] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.231867][T29983] System zones: 1-2, 19-19, 35-38, 46-46 [ 287.261624][T30000] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.280025][T29983] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/889/file0 supports timestamps until 2038 (0x7fffffff) [ 287.297040][T29999] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000600100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.346708][T30012] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 1: socketpair(0x1d, 0x0, 0x3f, &(0x7f0000000240)) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.391754][T30023] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$inet(r0, &(0x7f0000007c40)=[{{&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, 0x0}}], 0x1, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.454206][T30041] loop0: detected capacity change from 0 to 264192 [ 287.465222][T30038] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.485041][T30041] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 287.496746][T30041] System zones: 1-2, 19-19, 35-38, 46-46 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.502882][T30042] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.521206][T30041] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/890/file0 supports timestamps until 2038 (0x7fffffff) [ 287.531097][T30043] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x6e466000) 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000680100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.548998][T30053] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.583997][T30055] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000003c40)={'bond0\x00', @ifru_hwaddr=@dev}) bind$packet(r0, &(0x7f0000000040)={0x11, 0xd, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) [ 287.642994][T30071] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.657119][T30073] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.680358][T30078] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00', 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0xa) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x8ad6, 0x3000000, '\x00', [{}, {0x801}]}) [ 287.692800][T30081] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.704283][T30082] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.725281][T30091] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.784024][T30103] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.796343][T30105] loop0: detected capacity change from 0 to 264192 [ 287.806701][T30104] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000740100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 287.827039][T30105] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 287.838599][T30113] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.841157][T30105] System zones: 1-2, 19-19, 35-38, 46-46 [ 287.857411][T30105] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/892/file0 supports timestamps until 2038 (0x7fffffff) [ 287.870310][T30114] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.898022][T30117] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.922313][T30122] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.934035][T30125] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = timerfd_create(0x0, 0x0) dup3(r0, r1, 0x0) 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.962211][T30130] loop0: detected capacity change from 0 to 264192 [ 287.973163][T30134] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.999506][T30130] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/893/file0 supports timestamps until 2038 (0x7fffffff) [ 288.024482][T30139] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000180)='syzkaller\x00', 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.066675][T30142] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.081021][T30153] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.094017][T30152] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 288.126660][T30156] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.139296][T30163] loop0: detected capacity change from 0 to 264192 [ 288.148506][T30165] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.161721][T30163] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/894/file0 supports timestamps until 2038 (0x7fffffff) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.220109][T30173] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.247067][T30182] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.277885][T30185] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.284844][T30178] loop0: detected capacity change from 0 to 264192 [ 288.302065][T30197] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.317794][T30178] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/895/file0 supports timestamps until 2038 (0x7fffffff) [ 288.347179][T30196] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.374164][T30206] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.418507][T30212] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.442000][T30213] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.482834][T30226] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.496067][T30229] loop0: detected capacity change from 0 to 264192 [ 288.507657][T30231] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.535534][T30229] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/896/file0 supports timestamps until 2038 (0x7fffffff) [ 288.541923][T30233] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000900100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.587346][T30245] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.605432][T30247] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.638700][T30249] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.655080][T30259] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.690777][T30263] loop0: detected capacity change from 0 to 264192 [ 288.708871][T30257] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.734619][T30263] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/897/file0 supports timestamps until 2038 (0x7fffffff) [ 288.737947][T30267] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000910100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.825373][T30286] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.842479][T30287] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.854767][T30289] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.869603][T30298] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.913107][T30305] loop0: detected capacity change from 0 to 264192 [ 288.919635][T30296] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.968815][T30316] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.983905][T30305] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/898/file0 supports timestamps until 2038 (0x7fffffff) 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000920100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.014118][T30316] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.052756][T30329] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 289.102988][T30335] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.118196][T30341] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.137017][T30348] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.149205][T30350] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.155821][T30345] loop0: detected capacity change from 0 to 264192 [ 289.163006][T30351] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.241141][T30365] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.267007][T30345] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 289.267568][T30368] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 289.290475][T30345] System zones: 1-2, 19-19, 35-38, 46-46 [ 289.300544][T30345] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/899/file0 supports timestamps until 2038 (0x7fffffff) [ 289.315642][T30373] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.327890][T30369] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.339277][T30380] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.376902][T30391] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.388309][T30387] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.418938][T30392] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.462171][T30401] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.503620][T30413] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.524684][T30414] loop0: detected capacity change from 0 to 264192 [ 289.532841][T30415] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 289.549345][T30412] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.569148][T30414] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 289.585207][T30414] System zones: 1-2, 19-19, 35-38, 46-46 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.593320][T30414] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/900/file0 supports timestamps until 2038 (0x7fffffff) [ 289.594098][T30427] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 289.644674][T30429] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.662767][T30431] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.692376][T30442] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.750452][T30453] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.764443][T30455] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.764590][T30446] loop0: detected capacity change from 0 to 264192 [ 289.776369][T30458] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x56b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.813187][T30446] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 289.822718][T30446] System zones: 1-2, 19-19, 35-38, 46-46 [ 289.829758][T30446] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/901/file0 supports timestamps until 2038 (0x7fffffff) [ 289.841224][T30462] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.884324][T30461] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.902387][T30479] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.936421][T30478] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.948482][T30485] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.975122][T30492] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.991772][T30495] loop0: detected capacity change from 0 to 264192 [ 290.018480][T30499] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 290.031161][T30495] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/902/file0 supports timestamps until 2038 (0x7fffffff) [ 290.047966][T30502] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.106553][T30513] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.141632][T30520] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.178392][T30530] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.196135][T30531] loop0: detected capacity change from 0 to 264192 [ 290.211688][T30527] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.225351][T30531] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/903/file0 supports timestamps until 2038 (0x7fffffff) [ 290.251810][T30545] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.266405][T30550] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.290562][T30549] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.314557][T30552] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.335819][T30559] loop0: detected capacity change from 0 to 264192 [ 290.353603][T30557] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.371989][T30559] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/904/file0 supports timestamps until 2038 (0x7fffffff) 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.393343][T30566] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.435553][T30574] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.464190][T30578] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.497555][T30582] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.516976][T30592] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.533520][T30595] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.543260][T30590] loop0: detected capacity change from 0 to 264192 [ 290.562510][T30597] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 290.600908][T30590] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/905/file0 supports timestamps until 2038 (0x7fffffff) [ 290.635285][T30608] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.672486][T30611] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.692615][T30616] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.714981][T30621] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.733124][T30624] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.785719][T30639] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.804108][T30640] loop0: detected capacity change from 0 to 264192 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.844045][T30649] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.844566][T30640] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/906/file0 supports timestamps until 2038 (0x7fffffff) [ 290.873961][T30656] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.926778][T30655] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.939452][T30659] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.975711][T30670] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 291.029314][T30678] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.048497][T30681] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.096323][T30693] loop0: detected capacity change from 0 to 264192 [ 291.105575][T30683] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.110623][T30693] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 291.126024][T30693] System zones: 1-2, 19-19, 35-38, 46-46 [ 291.131535][T30689] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.132129][T30693] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/907/file0 supports timestamps until 2038 (0x7fffffff) [ 291.161489][T30698] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.211687][T30704] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.256374][T30707] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.274524][T30712] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.289533][T30716] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.311836][T30721] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) [ 291.364418][T30728] loop0: detected capacity change from 0 to 264192 [ 291.401477][T30728] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 291.412544][T30736] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.418275][T30728] System zones: 1-2, 19-19, 35-38, 46-46 [ 291.429965][T30728] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/909/file0 supports timestamps until 2038 (0x7fffffff) 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 291.477553][T30734] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.501017][T30740] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 291.519262][T30750] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.530780][T30754] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.549800][T30757] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.597859][T30766] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.633298][T30773] loop0: detected capacity change from 0 to 264192 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 291.659361][T30774] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.683275][T30782] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.691179][T30773] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.695875][T30784] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.718817][T30773] System zones: 1-2, 19-19, 35-38, 46-46 [ 291.725195][T30773] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/910/file0 supports timestamps until 2038 (0x7fffffff) 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.758211][T30788] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.788354][T30793] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.818881][T30799] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.834121][T30797] loop0: detected capacity change from 0 to 264192 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) [ 291.873811][T30814] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.906130][T30815] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.935448][T30797] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 291.946008][T30817] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.958093][T30797] System zones: 1-2, 19-19, 35-38, 46-46 [ 291.970321][T30826] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [], {0x14}}, 0x28}}, 0x0) [ 291.970853][T30797] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/911/file0 supports timestamps until 2038 (0x7fffffff) [ 291.997491][T30831] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.050184][T30838] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 1: creat(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) [ 292.101053][T30836] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.104757][T30843] loop0: detected capacity change from 0 to 264192 [ 292.119249][T30847] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000000c40)={0x2c, r1, 0x701, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}]}, 0x2c}}, 0x0) 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.144486][T30852] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.159192][T30843] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/912/file0 supports timestamps until 2038 (0x7fffffff) [ 292.183974][T30858] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 1: add_key$fscrypt_v1(&(0x7f0000000240), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.204708][T30854] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.230028][T30862] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000a00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000000300)=""/227, 0xe3}, {0x0}], 0x4, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001600)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.258416][T30866] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.294636][T30874] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.315811][T30878] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0a00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 292.316639][T30881] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.317082][T30883] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.346021][T30884] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.346387][T30885] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.360824][T30895] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.363013][T30897] loop0: detected capacity change from 0 to 264192 [ 292.370362][T30899] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.394065][T30897] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/913/file0 supports timestamps until 2038 (0x7fffffff) [ 292.419324][T30902] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.425138][T30908] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.443720][T30910] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.444327][T30912] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.448648][T30907] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.453199][T30913] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.465657][T30911] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.466322][T30917] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.489420][T30922] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.491764][T30915] loop0: detected capacity change from 0 to 264192 [ 292.505265][T30920] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.674509][T30915] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/914/file0 supports timestamps until 2038 (0x7fffffff) 01:01:38 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000b00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x8ad6, 0x3000000, '\x00', [{}, {0x801}]}) open(0x0, 0x0, 0x1f9) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.679319][T30923] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.725173][T30927] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.759225][T30934] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.771665][T30939] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.791889][T30944] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.824367][T30927] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.824657][T30956] loop0: detected capacity change from 0 to 264192 [ 292.840559][T30952] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.858475][T30944] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0b00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:39 executing program 1: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffe000/0x1000)=nil], &(0x7f0000000040)=[0xab2], 0x0, 0x0) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.875164][T30956] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/915/file0 supports timestamps until 2038 (0x7fffffff) [ 292.913964][T30957] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) [ 292.956780][T30966] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.971346][T30974] loop0: detected capacity change from 0 to 264192 [ 292.982437][T30972] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.003660][T30977] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.017345][T30975] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.035619][T30974] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 293.044183][T30974] System zones: 1-2, 19-19, 35-38, 46-46 01:01:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000900)='./file0\x00', 0x101743, 0x0) unlink(&(0x7f0000000640)='./file0\x00') 01:01:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000c00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 293.046849][T30985] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.050942][T30974] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/916/file0 supports timestamps until 2038 (0x7fffffff) [ 293.076850][T30986] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.111942][T30989] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.139282][T30994] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='numa_maps\x00') [ 293.155092][T30999] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.167899][T31003] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.193462][T31007] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000200)={0x0, 0xfffffffffffffd43, &(0x7f0000000100)={0x0, 0xfdd4}}, 0x0) 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.209288][T31013] loop0: detected capacity change from 0 to 264192 [ 293.220105][T31002] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.239413][T31013] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 293.246330][T31012] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.276971][T31010] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.277443][T31013] System zones: 1-2, 19-19, 35-38, 46-46 [ 293.295411][T31022] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.339749][T31026] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.352175][T31031] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.353716][T31013] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/917/file0 supports timestamps until 2038 (0x7fffffff) 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0c00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c262c927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd60da03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 01:01:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.381755][T31034] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.399419][T31038] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.427578][T31039] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.473009][T31042] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.484585][T31047] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.496869][T31049] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.508589][T31055] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.523952][T31056] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.529710][T31063] loop0: detected capacity change from 0 to 264192 [ 293.535827][T31057] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.563923][T31063] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.571877][T31063] System zones: 1-2, 19-19, 35-38, 46-46 [ 293.579365][T31062] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.593831][T31063] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/918/file0 supports timestamps until 2038 (0x7fffffff) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000d00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 293.620410][T31071] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.646212][T31072] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.661940][T31078] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.685885][T31077] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.697996][T31081] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.715441][T31085] loop0: detected capacity change from 0 to 264192 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.737928][T31085] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 293.750170][T31092] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.763908][T31085] System zones: 1-2, 19-19, 35-38, 46-46 [ 293.772268][T31085] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/919/file0 supports timestamps until 2038 (0x7fffffff) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.787924][T31097] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.815196][T31098] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.829020][T31103] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.840873][T31104] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 1: syz_io_uring_setup(0x260f, &(0x7f0000000700), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) 01:01:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0d00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 1: mlock2(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xe) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x6000) [ 294.324678][T31115] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.354680][T31124] loop0: detected capacity change from 0 to 264192 [ 294.362380][T31123] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.385938][T31127] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.402240][T31126] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.416433][T31124] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/920/file0 supports timestamps until 2038 (0x7fffffff) 01:01:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 1: r0 = syz_io_uring_setup(0x4a75, &(0x7f0000000000)={0x0, 0x5e4b, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000006d000)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000074800)={0xcd, [], 0x2, "e123e6dd988200"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000075800)={0x0, 0x0, "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", "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"}) syz_io_uring_setup(0x847, &(0x7f0000000080)={0x0, 0x0, 0x22, 0x0, 0xbe, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 01:01:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.441555][T31135] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.458683][T31140] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0e00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.494762][T31146] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) [ 294.545245][T31158] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.587552][T31150] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.592171][T31169] loop0: detected capacity change from 0 to 264192 [ 294.608697][T31165] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x18, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) [ 294.639575][T31175] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.654506][T31169] EXT4-fs mount: 35 callbacks suppressed [ 294.654521][T31169] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 294.668019][T31179] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.687153][T31180] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.691656][T31169] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/921/file0 supports timestamps until 2038 (0x7fffffff) 01:01:40 executing program 1: r0 = socket(0x18, 0x0, 0x1) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 01:01:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.731675][T31189] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.771044][T31192] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000f00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 1: getgroups(0x7, &(0x7f0000000100)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 1: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 294.812508][T31198] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.834364][T31204] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.858835][T31207] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.871269][T31214] loop0: detected capacity change from 0 to 264192 [ 294.878728][T31206] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 1: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.906828][T31216] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.919448][T31214] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 1: shmget(0x1, 0xc000, 0x0, &(0x7f0000ff4000/0xc000)=nil) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.989802][T31214] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/922/file0 supports timestamps until 2038 (0x7fffffff) [ 295.003286][T31234] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0f00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001180)=[{{&(0x7f0000000000)=@in={0x2, 0x4e24, @local}, 0x80, 0x0}}], 0x1, 0x0) [ 295.040290][T31232] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.062309][T31242] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.080290][T31241] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.093063][T31246] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.116569][T31250] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000004a4301"], 0x1c}}, 0x0) [ 295.160862][T31258] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.182784][T31263] loop0: detected capacity change from 0 to 264192 [ 295.191726][T31263] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 295.201470][T31263] System zones: 1-2, 19-19, 35-38, 46-46 [ 295.205577][T31264] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.208539][T31263] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 295.229496][T31263] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/923/file0 supports timestamps until 2038 (0x7fffffff) [ 295.232260][T31271] selinux_netlink_send: 21 callbacks suppressed 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 295.232274][T31271] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=17226 sclass=netlink_xfrm_socket pid=31271 comm=syz-executor.1 [ 295.282699][T31270] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.295521][T31273] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000001100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.322763][T31281] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x10, 0x1}], 0x10}, 0x1) [ 295.376429][T31289] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.392485][T31291] loop0: detected capacity change from 0 to 264192 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.421574][T31288] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.427390][T31291] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 295.444631][T31293] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.454455][T31291] System zones: 1-2, 19-19, 35-38, 46-46 01:01:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.482604][T31291] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 295.493476][T31306] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.508333][T31291] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/925/file0 supports timestamps until 2038 (0x7fffffff) 01:01:41 executing program 1: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 01:01:41 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 295.516032][T31310] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 1: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.562348][T31315] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.620803][T31328] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.639059][T31332] loop0: detected capacity change from 0 to 264192 [ 295.655623][T31333] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 1: accept$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0) 01:01:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.693403][T31338] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.712560][T31342] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.724738][T31332] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001440)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 295.738800][T31351] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.743848][T31332] System zones: 1-2, 19-19, 35-38, 46-46 [ 295.771635][T31355] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.806756][T31358] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.817460][T31332] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 295.822771][T31362] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.845800][T31365] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.849885][T31332] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/926/file0 supports timestamps until 2038 (0x7fffffff) [ 295.859623][T31363] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000200)) 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.907525][T31368] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) [ 295.959538][T31382] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.000262][T31392] loop0: detected capacity change from 0 to 264192 [ 296.008540][T31378] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.032720][T31392] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r6, 0x221, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x2c}}, 0x0) sendfile(r3, r2, 0x0, 0x10000000a) 01:01:42 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000001300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 296.050227][T31392] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/927/file0 supports timestamps until 2038 (0x7fffffff) [ 296.051956][T31386] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.099064][T31398] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.118458][T31402] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.155534][T31409] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.166607][T31416] loop0: detected capacity change from 0 to 264192 [ 296.175336][T31417] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.205575][T31416] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.247543][T31429] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.250932][T31416] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/928/file0 supports timestamps until 2038 (0x7fffffff) 01:01:42 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.303582][T31430] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.336397][T31433] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.348293][T31441] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.391669][T31442] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.397807][T31453] loop0: detected capacity change from 0 to 264192 [ 296.410115][T31444] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.430693][T31454] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.460153][T31457] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.472034][T31453] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 296.490726][T31453] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/929/file0 supports timestamps until 2038 (0x7fffffff) 01:01:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) recvmmsg(r0, &(0x7f0000001680)=[{{&(0x7f0000000000)=@nl=@proc, 0x0, &(0x7f0000001440)=[{&(0x7f0000000080)=""/10}, {&(0x7f00000000c0)=""/168}, {&(0x7f0000000180)=""/42}, {&(0x7f00000001c0)=""/204}, {&(0x7f00000002c0)=""/159}, {&(0x7f0000000380)=""/190}, {&(0x7f0000000440)=""/4096}], 0x300}}, {{&(0x7f00000014c0)=@in={0x2, 0x0, @dev}, 0x0, &(0x7f0000001640)=[{&(0x7f0000001540)=""/103}, {&(0x7f00000015c0)=""/98}]}}], 0x3, 0x0, 0x0) 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000001400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 296.503589][T31465] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.561456][T31472] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.591286][T31474] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.608545][T31484] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.620721][T31487] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.632856][T31489] loop0: detected capacity change from 0 to 264192 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.653208][T31488] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.675672][T31494] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.702067][T31489] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 296.716826][T31504] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.725637][T31489] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/930/file0 supports timestamps until 2038 (0x7fffffff) [ 296.752218][T31503] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.765023][T31509] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.782956][T31510] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.815839][T31511] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.827728][T31516] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000180)='S', 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 01:01:43 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.404942][T31523] loop0: detected capacity change from 0 to 264192 [ 297.427527][T31528] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.447246][T31534] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.458958][T31523] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 297.474368][T31523] System zones: 1-2, 19-19, 35-38, 46-46 [ 297.502703][T31535] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.521085][T31523] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 297.540543][T31536] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000180)='S', 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 01:01:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 297.555708][T31523] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/931/file0 supports timestamps until 2038 (0x7fffffff) [ 297.579030][T31542] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.624632][T31551] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.659256][T31556] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.674329][T31560] loop0: detected capacity change from 0 to 264192 [ 297.713467][T31567] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.727486][T31570] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.727989][T31560] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 297.759798][T31565] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.799532][T31560] System zones: 1-2 [ 297.799535][T31576] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.814077][T31581] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.814466][T31560] , 19-19, 35-38, 46-46 [ 297.830315][T31560] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.849226][T31579] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.849683][T31560] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/932/file0 supports timestamps until 2038 (0x7fffffff) [ 297.878354][T31584] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000180)='S', 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.901783][T31590] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.930874][T31592] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.985189][T31594] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.021511][T31612] loop0: detected capacity change from 0 to 264192 01:01:44 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.023178][T31613] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.049142][T31606] ==================================================================