, &(0x7f0000013800)) 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.264828][T21857] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.278646][T21868] loop0: detected capacity change from 0 to 264192 [ 246.296986][T21869] loop1: detected capacity change from 0 to 264192 [ 246.297963][T21859] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.317033][T21868] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:00:52 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038d00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.362171][T21879] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.379253][T21859] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.439521][T21888] loop0: detected capacity change from 0 to 264192 [ 246.444537][T21889] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.472732][T21890] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.486112][T21901] loop1: detected capacity change from 0 to 264192 [ 246.488466][T21888] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 246.511650][T21900] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038e00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.534937][T21910] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:52 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.619340][T21921] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.635978][T21917] loop0: detected capacity change from 0 to 264192 [ 246.645336][T21928] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.675494][T21919] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.689931][T21917] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 246.721009][T21934] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.743860][T21941] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.745697][T21945] loop1: detected capacity change from 0 to 264192 01:00:52 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038f00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.781414][T21944] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.799919][T21943] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.812183][T21948] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.830643][T21949] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.848820][T21955] loop0: detected capacity change from 0 to 264192 [ 246.849731][T21954] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.875642][T21955] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.902369][T21956] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.932980][T21967] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 246.938519][T21968] loop1: detected capacity change from 0 to 264192 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.993704][T21972] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.022467][T21985] loop0: detected capacity change from 0 to 264192 [ 247.028260][T21981] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 247.049203][T21985] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 247.084495][T21991] loop1: detected capacity change from 0 to 264192 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.121314][T21999] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 247.161097][T22000] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.164093][T22005] loop0: detected capacity change from 0 to 264192 [ 247.196870][T22005] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 247.203088][T22013] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.217940][T22006] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.279285][T22011] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.288962][T22026] loop1: detected capacity change from 0 to 264192 [ 247.303134][T22030] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.318288][T22031] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.318563][T22024] loop0: detected capacity change from 0 to 264192 [ 247.330591][T22033] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.383763][T22035] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.400637][T22041] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.412649][T22024] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 247.420911][T22044] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.441792][T22049] loop1: detected capacity change from 0 to 264192 [ 247.465696][T22043] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.508756][T22040] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.543882][T22056] loop0: detected capacity change from 0 to 264192 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 247.551162][T22053] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.569556][T22057] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.581423][T22064] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.586345][T22056] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.593136][T22067] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.621032][T22068] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.681901][T22080] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.682027][T22076] loop1: detected capacity change from 0 to 264192 [ 247.710476][T22083] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:53 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) [ 247.762702][T22086] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.792108][T22097] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:53 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.813287][T22098] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.826740][T22099] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 247.835363][T22100] loop0: detected capacity change from 0 to 264192 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.881018][T22112] loop1: detected capacity change from 0 to 264192 [ 247.890864][T22100] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 247.895235][T22115] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) [ 247.961140][T22130] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.038925][T22140] loop0: detected capacity change from 0 to 264192 [ 248.052710][T22140] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 248.058604][T22146] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.109170][T22154] loop1: detected capacity change from 0 to 264192 [ 248.140450][T22160] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.169164][T22163] loop0: detected capacity change from 0 to 264192 01:00:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000026a800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.220389][T22163] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 248.248219][T22176] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000002b900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.286067][T22187] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.367427][T22204] loop0: detected capacity change from 0 to 264192 [ 248.377935][T22206] loop1: detected capacity change from 0 to 264192 [ 248.382185][T22204] EXT4-fs (loop0): inodes count not valid: 32 vs 192 [ 248.402722][T22208] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000ffffffe000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 248.443583][T22218] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, 0x0, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.508432][T22226] loop0: detected capacity change from 0 to 264192 [ 248.520746][T22226] EXT4-fs (loop0): inodes count not valid: 4294901792 vs 256 [ 248.547719][T22232] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000026ec00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.569206][T22237] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.648574][T22253] loop0: detected capacity change from 0 to 264192 [ 248.650087][T22255] loop1: detected capacity change from 0 to 264192 [ 248.664260][T22251] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.693503][T22253] EXT4-fs (loop0): inodes count not valid: 32 vs 256 [ 248.695074][T22264] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 248.718619][T22263] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, 0x0, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.751423][T22270] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:54 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.827797][T22278] loop0: detected capacity change from 0 to 264192 [ 248.842418][T22278] EXT4-fs (loop0): inodes count not valid: 32 vs 256 [ 248.852707][T22286] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 248.897419][T22295] loop1: detected capacity change from 0 to 264192 [ 248.899915][T22296] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 248.917566][T22299] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 248.933295][T22301] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 248.946984][T22305] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 248.969017][T22308] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, 0x0, 0x0) 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x104000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.023325][T22315] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.036260][T22316] loop0: detected capacity change from 0 to 264192 [ 249.050098][T22314] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.057368][T22316] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.088069][T22318] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.099792][T22326] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20007ffffff200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.143563][T22327] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.163292][T22335] loop1: detected capacity change from 0 to 264192 [ 249.173637][T22343] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.183899][T22344] loop0: detected capacity change from 0 to 264192 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x105400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.195033][T22341] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 249.271841][T22347] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.273629][T22344] EXT4-fs (loop0): inodes count not valid: 4286513184 vs 256 [ 249.288927][T22355] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.312238][T22359] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.353986][T22362] loop1: detected capacity change from 0 to 264192 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2e02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.421277][T22378] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.472011][T22388] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.487592][T22391] loop0: detected capacity change from 0 to 264192 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 249.516277][T22391] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.567340][T22406] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.610315][T22409] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.610541][T22411] loop1: detected capacity change from 0 to 264192 [ 249.626914][T22415] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.642716][T22417] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.689627][T22427] loop0: detected capacity change from 0 to 264192 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 249.748364][T22434] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.750394][T22427] EXT4-fs (loop0): inodes count not valid: 32 vs 256 [ 249.783054][T22441] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:55 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.794907][T22443] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.807403][T22445] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.830628][T22444] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.883596][T22457] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 249.906686][T22462] loop1: detected capacity change from 0 to 264192 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.939870][T22470] loop0: detected capacity change from 0 to 264192 [ 249.975120][T22470] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4af000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.016902][T22481] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4fd000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.066970][T22491] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.097198][T22495] loop1: detected capacity change from 0 to 264192 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.115474][T22493] loop0: detected capacity change from 0 to 264192 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.161530][T22493] EXT4-fs (loop0): inodes count not valid: 32 vs 256 [ 250.182315][T22511] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.261241][T22518] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.273157][T22524] loop0: detected capacity change from 0 to 264192 [ 250.275440][T22523] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.287582][T22524] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20007ffffff800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.302216][T22522] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.328685][T22534] loop1: detected capacity change from 0 to 264192 [ 250.329987][T22529] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.372398][T22538] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.411365][T22541] loop0: detected capacity change from 0 to 264192 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x541000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.427574][T22545] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.448054][T22541] EXT4-fs (loop0): inodes count not valid: 4286513184 vs 256 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x550000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.470260][T22554] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x54000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049f900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x570000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.558439][T22568] loop1: detected capacity change from 0 to 264192 [ 250.565243][T22572] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x56b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.607681][T22581] loop0: detected capacity change from 0 to 264192 [ 250.621294][T22583] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.636753][T22581] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20007ffffff900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:56 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x970000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd04f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 250.741980][T22596] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 250.761752][T22601] loop0: detected capacity change from 0 to 264192 [ 250.781864][T22601] EXT4-fs (loop0): inodes count not valid: 4286513184 vs 256 01:00:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:56 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fa00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.810720][T22610] loop1: detected capacity change from 0 to 264192 [ 250.832606][T22615] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf04a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 250.927873][T22627] loop0: detected capacity change from 0 to 264192 [ 250.966333][T22627] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf0ff1f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fb00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.990140][T22640] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.022088][T22642] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.080387][T22654] loop1: detected capacity change from 0 to 264192 [ 251.120087][T22661] loop0: detected capacity change from 0 to 264192 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 251.142764][T22668] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.166337][T22661] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.203574][T22671] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.230689][T22678] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fc00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.248290][T22685] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.294702][T22697] loop1: detected capacity change from 0 to 264192 [ 251.309874][T22696] loop0: detected capacity change from 0 to 264192 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.336150][T22696] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fd00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 251.388324][T22713] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.456285][T22724] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3045000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.503768][T22730] loop0: detected capacity change from 0 to 264192 [ 251.527519][T22741] loop1: detected capacity change from 0 to 264192 [ 251.541238][T22730] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049fe00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.593190][T22750] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.666892][T22765] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.683995][T22761] loop0: detected capacity change from 0 to 264192 [ 251.694080][T22766] loop1: detected capacity change from 0 to 264192 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.740833][T22761] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:57 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000049ff00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 251.793169][T22784] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.862865][T22796] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 251.884196][T22801] loop0: detected capacity change from 0 to 264192 [ 251.888519][T22803] loop1: detected capacity change from 0 to 264192 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.917964][T22801] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000007ffff00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:58 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.986203][T22821] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.052153][T22828] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.072131][T22835] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.106000][T22836] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.119371][T22838] loop0: detected capacity change from 0 to 264192 [ 252.136894][T22838] EXT4-fs (loop0): inodes count not valid: 117440544 vs 256 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20007fffffff00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 252.168282][T22856] loop1: detected capacity change from 0 to 264192 [ 252.180417][T22855] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.229452][T22866] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.267645][T22873] loop0: detected capacity change from 0 to 264192 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.291367][T22873] EXT4-fs (loop0): inodes count not valid: 4286513184 vs 256 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.343823][T22883] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.387697][T22887] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.422572][T22894] loop0: detected capacity change from 0 to 264192 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb402}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.432448][T22892] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.459617][T22894] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 [ 252.459916][T22902] loop1: detected capacity change from 0 to 264192 [ 252.471593][T22906] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb456}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000003000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 252.529050][T22917] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.631910][T22934] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.647632][T22935] loop0: detected capacity change from 0 to 264192 [ 252.663941][T22935] EXT4-fs (loop0): inodes count not valid: 50331680 vs 32 01:00:58 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000004000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.716800][T22957] loop1: detected capacity change from 0 to 264192 [ 252.732081][T22958] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.787355][T22967] loop0: detected capacity change from 0 to 264192 [ 252.808050][T22974] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:58 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:58 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:58 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.838482][T22967] EXT4-fs (loop0): inodes count not valid: 67108896 vs 32 [ 252.848984][T22976] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.876898][T22981] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000005000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.941091][T22994] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 252.961972][T22996] loop1: detected capacity change from 0 to 264192 [ 252.975675][T23001] loop0: detected capacity change from 0 to 264192 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.997334][T23001] EXT4-fs (loop0): inodes count not valid: 83886112 vs 32 [ 253.009697][T23011] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x13000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000006000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.104166][T23027] loop0: detected capacity change from 0 to 264192 [ 253.115611][T23026] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.135365][T23018] loop1: detected capacity change from 0 to 264192 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ffff000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) [ 253.150005][T23034] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.197487][T23039] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.215212][T23045] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.218610][T23027] EXT4-fs (loop0): inodes count not valid: 100663328 vs 32 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x21000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.303360][T23059] loop1: detected capacity change from 0 to 264192 [ 253.322356][T23062] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.335884][T23067] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000007000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.443782][T23084] loop0: detected capacity change from 0 to 264192 [ 253.471785][T23090] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.484847][T23084] EXT4-fs (loop0): inodes count not valid: 117440544 vs 32 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.496948][T23095] loop1: detected capacity change from 0 to 264192 [ 253.520094][T23102] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000008000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.656174][T23128] loop0: detected capacity change from 0 to 264192 [ 253.669992][T23125] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.695817][T23136] loop1: detected capacity change from 0 to 264192 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000009000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 253.702767][T23128] EXT4-fs (loop0): inodes count not valid: 134217760 vs 32 [ 253.712626][T23143] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:00:59 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:00:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.834905][T23161] loop0: detected capacity change from 0 to 264192 [ 253.845375][T23165] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.865195][T23163] loop1: detected capacity change from 0 to 264192 [ 253.878672][T23169] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.911059][T23161] EXT4-fs (loop0): inodes count not valid: 150994976 vs 32 01:01:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000a000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.971293][T23185] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 253.999630][T23192] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.059287][T23201] loop1: detected capacity change from 0 to 264192 [ 254.080484][T23207] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 254.105585][T23209] loop0: detected capacity change from 0 to 264192 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 254.156764][T23209] EXT4-fs (loop0): inodes count not valid: 167772192 vs 32 [ 254.166080][T23222] loop1: detected capacity change from 0 to 264192 [ 254.185165][T23227] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000b000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.268804][T23241] loop1: detected capacity change from 0 to 264192 01:01:00 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r0, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.333589][T23254] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 254.346281][T23255] loop0: detected capacity change from 0 to 264192 [ 254.364193][T23262] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000c000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 254.393545][T23255] EXT4-fs (loop0): inodes count not valid: 184549408 vs 32 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r0, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r0, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.520006][T23290] loop0: detected capacity change from 0 to 264192 [ 254.554050][T23290] EXT4-fs (loop0): inodes count not valid: 201326624 vs 32 01:01:00 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000d000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.640613][T23318] loop1: detected capacity change from 0 to 264192 01:01:00 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.705507][T23328] loop0: detected capacity change from 0 to 264192 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.755881][T23328] EXT4-fs (loop0): inodes count not valid: 218103840 vs 32 01:01:00 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000e000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.808003][T23353] loop1: detected capacity change from 0 to 264192 01:01:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:00 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.916129][T23372] loop0: detected capacity change from 0 to 264192 [ 254.936999][T23372] EXT4-fs (loop0): inodes count not valid: 234881056 vs 32 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000f000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.986132][T23393] loop1: detected capacity change from 0 to 264192 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.072276][T23413] loop0: detected capacity change from 0 to 264192 [ 255.102390][T23413] EXT4-fs (loop0): inodes count not valid: 251658272 vs 32 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000010000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2e020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000011000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 255.224884][T23446] loop0: detected capacity change from 0 to 264192 [ 255.250017][T23446] EXT4-fs (loop0): inodes count not valid: 268435488 vs 32 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.294289][T23457] loop1: detected capacity change from 0 to 264192 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.363029][T23468] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 255.384023][T23482] loop0: detected capacity change from 0 to 264192 [ 255.394943][T23485] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000012000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 255.419445][T23488] loop1: detected capacity change from 0 to 264192 [ 255.429454][T23482] EXT4-fs (loop0): inodes count not valid: 285212704 vs 32 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.532245][T23510] loop0: detected capacity change from 0 to 264192 [ 255.547842][T23510] EXT4-fs (loop0): inodes count not valid: 301989920 vs 32 [ 255.552575][T23514] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 255.558197][T23516] FAT-fs (loop1): bogus number of reserved sectors [ 255.572726][T23516] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000014000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.626817][T23527] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.683222][T23539] loop0: detected capacity change from 0 to 264192 [ 255.709666][T23539] EXT4-fs (loop0): inodes count not valid: 335544352 vs 32 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000018000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.748846][T23555] FAT-fs (loop1): bogus number of reserved sectors [ 255.755475][T23555] FAT-fs (loop1): Can't find a valid FAT filesystem [ 255.779520][T23559] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.817303][T23571] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 255.856082][T23568] loop0: detected capacity change from 0 to 264192 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000019000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x54b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.881877][T23568] EXT4-fs (loop0): inodes count not valid: 402653216 vs 32 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 255.959700][T23596] FAT-fs (loop1): bogus number of reserved sectors [ 255.964931][T23602] loop0: detected capacity change from 0 to 264192 [ 255.966279][T23596] FAT-fs (loop1): Can't find a valid FAT filesystem [ 255.983737][T23602] EXT4-fs (loop0): inodes count not valid: 419430432 vs 32 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000022000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b33a20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.120737][T23633] loop0: detected capacity change from 0 to 264192 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000025000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.167525][T23633] EXT4-fs (loop0): inodes count not valid: 570425376 vs 32 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.276452][T23666] loop0: detected capacity change from 0 to 264192 [ 256.311014][T23671] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 256.333540][T23666] EXT4-fs (loop0): inodes count not valid: 620757024 vs 32 [ 256.339704][T23677] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002e000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.424892][T23689] loop1: detected capacity change from 0 to 264192 [ 256.455841][T23689] FAT-fs (loop1): bogus number of reserved sectors [ 256.462529][T23689] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 256.510329][T23703] loop0: detected capacity change from 0 to 264192 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.586188][T23703] EXT4-fs (loop0): inodes count not valid: 771751968 vs 32 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x550000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000046000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.628669][T23723] loop1: detected capacity change from 0 to 264192 [ 256.644904][T23723] FAT-fs (loop1): bogus number of reserved sectors [ 256.651564][T23723] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x570000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.736364][T23749] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 256.748351][T23752] loop0: detected capacity change from 0 to 264192 01:01:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.802430][T23762] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 256.828534][T23752] EXT4-fs (loop0): inodes count not valid: 1174405152 vs 32 [ 256.833987][T23765] loop1: detected capacity change from 0 to 264192 01:01:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f141457a000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000047000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 256.867809][T23765] FAT-fs (loop1): bogus number of reserved sectors [ 256.874450][T23765] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f141457b000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.970463][T23798] loop0: detected capacity change from 0 to 264192 [ 256.992522][T23798] EXT4-fs (loop0): inodes count not valid: 1191182368 vs 32 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd0010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f141459b000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000048000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 257.028735][T23811] loop1: detected capacity change from 0 to 264192 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.087333][T23811] FAT-fs (loop1): bogus number of reserved sectors [ 257.094012][T23811] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 257.132497][T23829] loop0: detected capacity change from 0 to 264192 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f141459c000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.176708][T23829] EXT4-fs (loop0): inodes count not valid: 1207959584 vs 32 [ 257.211992][T23842] loop1: detected capacity change from 0 to 264192 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000049000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.241936][T23842] FAT-fs (loop1): bogus number of reserved sectors [ 257.248678][T23842] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f14145bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 257.332636][T23874] loop0: detected capacity change from 0 to 264192 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x56b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f14147bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.391487][T23874] EXT4-fs (loop0): inodes count not valid: 1224736800 vs 32 [ 257.427435][T23892] loop1: detected capacity change from 0 to 264192 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000004a000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.462029][T23892] FAT-fs (loop1): bogus number of reserved sectors [ 257.468619][T23892] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f14149bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.531651][T23916] loop0: detected capacity change from 0 to 264192 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.588902][T23916] EXT4-fs (loop0): inodes count not valid: 1241514016 vs 32 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x970000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000004b000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 257.644796][T23939] loop1: detected capacity change from 0 to 264192 [ 257.658610][T23939] FAT-fs (loop1): bogus number of reserved sectors [ 257.665207][T23939] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa2331b000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.755112][T23957] loop0: detected capacity change from 0 to 264192 [ 257.770834][T23959] loop1: detected capacity change from 0 to 264192 [ 257.778566][T23957] EXT4-fs (loop0): inodes count not valid: 1258291232 vs 32 01:01:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.807949][T23959] FAT-fs (loop1): bogus number of reserved sectors [ 257.814672][T23959] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:03 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000004c000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:03 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.891580][T23987] loop0: detected capacity change from 0 to 264192 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb454}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 257.932483][T24000] loop1: detected capacity change from 0 to 264192 [ 257.934679][T23987] EXT4-fs (loop0): inodes count not valid: 1275068448 vs 32 [ 257.951291][T24000] FAT-fs (loop1): bogus number of reserved sectors [ 257.957865][T24000] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000060000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb458}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.079256][T24024] loop1: detected capacity change from 0 to 264192 [ 258.099100][T24030] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 258.122469][T24024] FAT-fs (loop1): bogus number of reserved sectors 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.129030][T24024] FAT-fs (loop1): Can't find a valid FAT filesystem [ 258.139382][T24036] loop0: detected capacity change from 0 to 264192 [ 258.166100][T24046] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 258.184524][T24036] EXT4-fs (loop0): inodes count not valid: 1610612768 vs 32 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000068000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.260944][T24061] loop1: detected capacity change from 0 to 264192 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10400000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.302360][T24061] FAT-fs (loop1): bogus number of reserved sectors [ 258.309204][T24061] FAT-fs (loop1): Can't find a valid FAT filesystem [ 258.340588][T24077] loop0: detected capacity change from 0 to 264192 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000006c000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 258.386086][T24077] EXT4-fs (loop0): inodes count not valid: 1744830496 vs 32 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10540000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.431426][T24094] loop1: detected capacity change from 0 to 264192 [ 258.436099][T24088] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 258.454880][T24094] FAT-fs (loop1): bogus number of reserved sectors [ 258.461494][T24094] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.483774][T24098] loop0: detected capacity change from 0 to 264192 [ 258.505306][T24098] EXT4-fs (loop0): inodes count not valid: 1811939360 vs 32 [ 258.522249][T24111] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000074000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.609994][T24126] loop1: detected capacity change from 0 to 264192 [ 258.638414][T24126] FAT-fs (loop1): invalid media value (0x00) [ 258.644566][T24126] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.668550][T24139] loop0: detected capacity change from 0 to 264192 [ 258.691206][T24139] EXT4-fs (loop0): inodes count not valid: 1946157088 vs 32 01:01:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x50040300000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000007a000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.786923][T24163] loop1: detected capacity change from 0 to 264192 [ 258.812216][T24170] loop0: detected capacity change from 0 to 264192 01:01:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa05714147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.833501][T24163] FAT-fs (loop1): invalid media value (0x00) [ 258.839510][T24163] FAT-fs (loop1): Can't find a valid FAT filesystem [ 258.857482][T24170] EXT4-fs (loop0): inodes count not valid: 2046820384 vs 32 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000008e000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.898803][T24189] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb05714147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.951143][T24199] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 258.983564][T24197] loop0: detected capacity change from 0 to 264192 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb05914147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 258.999576][T24197] EXT4-fs (loop0): inodes count not valid: 2382364704 vs 32 [ 259.023202][T24210] loop1: detected capacity change from 0 to 264192 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000008f000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 259.055037][T24210] FAT-fs (loop1): invalid media value (0x00) [ 259.061055][T24210] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc05914147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc05b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.146906][T24237] loop0: detected capacity change from 0 to 264192 [ 259.158571][T24237] EXT4-fs (loop0): inodes count not valid: 2399141920 vs 32 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.204672][T24246] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc07b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.258013][T24253] loop1: detected capacity change from 0 to 264192 [ 259.287102][T24262] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000090000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.304213][T24253] FAT-fs (loop1): invalid media value (0x00) [ 259.310224][T24253] FAT-fs (loop1): Can't find a valid FAT filesystem 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc09b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 259.366146][T24281] loop0: detected capacity change from 0 to 264192 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd04f0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000091000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.429751][T24281] EXT4-fs (loop0): inodes count not valid: 2415919136 vs 32 [ 259.466344][T24305] loop1: detected capacity change from 0 to 264192 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf04a0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.529963][T24319] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 259.543704][T24305] FAT-fs (loop1): invalid media value (0x00) [ 259.549907][T24305] FAT-fs (loop1): Can't find a valid FAT filesystem [ 259.552867][T24323] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.576529][T24322] loop0: detected capacity change from 0 to 264192 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf0ff1f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.616480][T24322] EXT4-fs (loop0): inodes count not valid: 2432696352 vs 32 [ 259.639616][T24337] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.686994][T24345] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000092000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.738079][T24356] loop1: detected capacity change from 0 to 264192 [ 259.763063][T24356] FAT-fs (loop1): invalid media value (0x00) [ 259.769112][T24356] FAT-fs (loop1): Can't find a valid FAT filesystem [ 259.772599][T24365] loop0: detected capacity change from 0 to 264192 01:01:05 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000008a010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 259.803675][T24365] EXT4-fs (loop0): inodes count not valid: 2449473568 vs 32 01:01:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.856334][T24378] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.912612][T24389] loop0: detected capacity change from 0 to 264192 [ 259.928219][T24395] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 259.932104][T24392] loop1: detected capacity change from 0 to 264192 [ 259.944306][T24389] EXT4-fs (loop0): inodes count not valid: 2315255840 vs 32 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e4010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.981637][T24392] FAT-fs (loop1): bogus number of FAT sectors [ 259.987761][T24392] FAT-fs (loop1): Can't find a valid FAT filesystem [ 260.016868][T24410] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 260.047913][T24417] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.073735][T24413] loop0: detected capacity change from 0 to 264192 [ 260.085953][T24413] EXT4-fs (loop0): inodes count not valid: 3825205280 vs 32 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e6010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.132158][T24435] loop1: detected capacity change from 0 to 264192 [ 260.154299][T24437] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.177526][T24435] FAT-fs (loop1): bogus number of FAT sectors [ 260.183649][T24435] FAT-fs (loop1): Can't find a valid FAT filesystem [ 260.212071][T24452] loop0: detected capacity change from 0 to 264192 [ 260.221646][T24451] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e7010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.235045][T24452] EXT4-fs (loop0): inodes count not valid: 3858759712 vs 32 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.305121][T24473] loop1: detected capacity change from 0 to 264192 [ 260.321651][T24473] FAT-fs (loop1): bogus number of FAT sectors [ 260.327808][T24473] FAT-fs (loop1): Can't find a valid FAT filesystem [ 260.329793][T24471] loop0: detected capacity change from 0 to 264192 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.363985][T24481] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.383007][T24471] EXT4-fs (loop0): inodes count not valid: 3875536928 vs 32 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e8010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.441178][T24494] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.487673][T24507] loop1: detected capacity change from 0 to 264192 [ 260.510818][T24508] loop0: detected capacity change from 0 to 264192 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.529529][T24516] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.541477][T24508] EXT4-fs (loop0): inodes count not valid: 3892314144 vs 32 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000e9010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.584292][T24528] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.641631][T24535] loop0: detected capacity change from 0 to 264192 [ 260.651990][T24535] EXT4-fs (loop0): inodes count not valid: 3909091360 vs 32 [ 260.670695][T24544] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000ea010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.706609][T24553] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.718450][T24555] loop1: detected capacity change from 0 to 264192 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.769451][T24567] loop0: detected capacity change from 0 to 264192 [ 260.783064][T24570] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.804855][T24578] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:06 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.817817][T24567] EXT4-fs (loop0): inodes count not valid: 3925868576 vs 32 01:01:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000eb010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.898368][T24583] loop1: detected capacity change from 0 to 264192 [ 260.920094][T24595] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 260.957201][T24606] loop0: detected capacity change from 0 to 264192 [ 260.967352][T24607] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 260.990453][T24606] EXT4-fs (loop0): inodes count not valid: 3942645792 vs 32 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000004020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.057968][T24612] loop1: detected capacity change from 0 to 264192 [ 261.079477][T24632] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.117674][T24640] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.135775][T24639] loop0: detected capacity change from 0 to 264192 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.186583][T24639] EXT4-fs (loop0): inodes count not valid: 67108896 vs 32 [ 261.204481][T24654] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.227668][T24657] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, 0x0, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000014020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.261897][T24665] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000015020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 261.317220][T24676] loop0: detected capacity change from 0 to 264192 [ 261.342498][T24676] EXT4-fs (loop0): inodes count not valid: 335544352 vs 32 [ 261.350301][T24671] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, 0x0, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.424249][T24697] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.443340][T24703] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.457189][T24701] loop0: detected capacity change from 0 to 264192 [ 261.468127][T24701] EXT4-fs (loop0): inodes count not valid: 352321568 vs 32 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000016020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.503598][T24718] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.566745][T24733] loop0: detected capacity change from 0 to 264192 [ 261.581627][T24735] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 261.609058][T24733] EXT4-fs (loop0): inodes count not valid: 369098784 vs 32 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, 0x0, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.630779][T24746] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000017020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.694026][T24751] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.771506][T24772] loop0: detected capacity change from 0 to 264192 [ 261.779798][T24772] EXT4-fs (loop0): inodes count not valid: 385876000 vs 32 [ 261.803641][T24775] loop1: detected capacity change from 0 to 264192 01:01:07 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000018020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:07 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 261.913731][T24795] loop0: detected capacity change from 0 to 264192 [ 261.945422][T24795] EXT4-fs (loop0): inodes count not valid: 402653216 vs 32 [ 261.951010][T24807] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000019020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x56b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.058576][T24830] loop0: detected capacity change from 0 to 264192 [ 262.097486][T24839] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.099105][T24830] EXT4-fs (loop0): inodes count not valid: 419430432 vs 32 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, 0x0, r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2e02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000001a020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 262.196051][T24830] loop0: detected capacity change from 0 to 264192 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.255174][T24868] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, 0x0, r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.350714][T24895] loop0: detected capacity change from 0 to 264192 [ 262.389664][T24895] EXT4-fs (loop0): inodes count not valid: 436207648 vs 32 [ 262.451754][T24920] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000075020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, 0x0, r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.533967][T24933] loop0: detected capacity change from 0 to 264192 [ 262.545719][T24932] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.586947][T24933] EXT4-fs (loop0): inodes count not valid: 1962934304 vs 32 01:01:08 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000030100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 262.685151][T24961] loop1: detected capacity change from 0 to 264192 [ 262.713522][T24975] loop0: detected capacity change from 0 to 264192 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x54b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.783494][T24975] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 262.809975][T24993] loop1: detected capacity change from 0 to 264192 01:01:08 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:08 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 262.821506][T24975] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/775/file0 supports timestamps until 2038 (0x7fffffff) 01:01:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002040100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.001169][T25038] loop1: detected capacity change from 0 to 264192 [ 263.001290][T25036] loop0: detected capacity change from 0 to 264192 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 263.062950][T25036] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000006040100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 263.124887][T25059] loop1: detected capacity change from 0 to 264192 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.179360][T25075] loop0: detected capacity change from 0 to 264192 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, 0x0) r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.236262][T25075] EXT4-fs (loop0): inodes count not valid: 100663328 vs 32 [ 263.245261][T25085] loop1: detected capacity change from 0 to 264192 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000010040100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.334273][T25099] loop1: detected capacity change from 0 to 264192 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.409352][T25122] loop0: detected capacity change from 0 to 264192 [ 263.443600][T25120] loop1: detected capacity change from 0 to 264192 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.484146][T25122] EXT4-fs (loop0): inodes count not valid: 268435488 vs 32 [ 263.511806][T25142] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000050100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.556899][T25149] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 263.597659][T25159] loop1: detected capacity change from 0 to 264192 [ 263.612397][T25160] loop0: detected capacity change from 0 to 264192 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.664363][T25172] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 263.668126][T25160] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 263.691097][T25175] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.719980][T25160] System zones: 1-2, 19-19, 35-38, 46-46 [ 263.751859][T25160] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:09 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.768170][T25186] loop1: detected capacity change from 0 to 264192 [ 263.774806][T25160] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/779/file0 supports timestamps until 2038 (0x7fffffff) 01:01:09 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000060100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:09 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd001000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.847821][T25199] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 263.862655][T25206] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.899255][T25210] loop1: detected capacity change from 0 to 264192 [ 263.918188][T25220] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 263.973733][T25227] loop0: detected capacity change from 0 to 264192 [ 264.006789][T25227] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb456}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.029749][T25240] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000004060100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffb458}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.067293][T25227] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/780/file0 supports timestamps until 2038 (0x7fffffff) [ 264.093658][T25249] loop1: detected capacity change from 0 to 264192 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.132477][T25260] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.159155][T25265] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.217922][T25275] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.236241][T25279] loop0: detected capacity change from 0 to 264192 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.260215][T25280] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.271516][T25276] loop1: detected capacity change from 0 to 264192 [ 264.289790][T25279] EXT4-fs (loop0): inodes count not valid: 67108896 vs 32 01:01:10 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000070100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.392198][T25305] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.412045][T25310] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.433647][T25314] loop0: detected capacity change from 0 to 264192 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.435420][T25304] loop1: detected capacity change from 0 to 264192 [ 264.460018][T25314] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.479658][T25314] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/782/file0 supports timestamps until 2038 (0x7fffffff) 01:01:10 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000090100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.542675][T25331] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 264.573603][T25339] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.606359][T25344] loop0: detected capacity change from 0 to 264192 [ 264.640613][T25344] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.680859][T25362] loop1: detected capacity change from 0 to 264192 [ 264.692342][T25344] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/783/file0 supports timestamps until 2038 (0x7fffffff) [ 264.694542][T25363] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 264.740240][T25369] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.822591][T25384] loop0: detected capacity change from 0 to 264192 [ 264.840654][T25384] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 264.854854][T25384] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/784/file0 supports timestamps until 2038 (0x7fffffff) 01:01:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.855290][T25385] loop1: detected capacity change from 0 to 264192 01:01:11 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000b0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.909210][T25401] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.977218][T25412] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.014230][T25422] loop0: detected capacity change from 0 to 264192 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.030272][T25422] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 265.038380][T25422] System zones: 1-2, 19-19, 35-38, 46-46 [ 265.056842][T25422] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:11 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.075416][T25422] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/785/file0 supports timestamps until 2038 (0x7fffffff) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.144006][T25443] loop1: detected capacity change from 0 to 264192 [ 265.151423][T25446] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.197323][T25458] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.214584][T25459] loop0: detected capacity change from 0 to 264192 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.247687][T25459] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 265.260760][T25459] System zones: 1-2, 19-19, 35-38, 46-46 [ 265.286092][T25459] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.299080][T25459] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/786/file0 supports timestamps until 2038 (0x7fffffff) 01:01:11 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000d0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.340990][T25478] loop1: detected capacity change from 0 to 264192 [ 265.354388][T25483] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.379407][T25487] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.430110][T25498] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.480529][T25510] loop0: detected capacity change from 0 to 264192 [ 265.489849][T25503] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.507236][T25512] loop1: detected capacity change from 0 to 264192 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.526140][T25516] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.580570][T25510] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 265.590859][T25525] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.601406][T25510] System zones: 1-2, 19-19, 35-38, 46-46 01:01:11 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.629845][T25510] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 265.647943][T25510] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/787/file0 supports timestamps until 2038 (0x7fffffff) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.690124][T25537] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.714205][T25543] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.733126][T25550] loop1: detected capacity change from 0 to 264192 01:01:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.761155][T25558] loop0: detected capacity change from 0 to 264192 01:01:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 265.816144][T25565] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 265.828097][T25558] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 265.852189][T25558] System zones: 1-2, 19-19, 35-38, 46-46 [ 265.859394][T25558] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 265.870476][T25558] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/788/file0 supports timestamps until 2038 (0x7fffffff) [ 265.880589][T25577] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x13}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.934377][T25583] loop1: detected capacity change from 0 to 264192 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 265.991082][T25591] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.043985][T25604] loop0: detected capacity change from 0 to 264192 [ 266.075156][T25604] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000004100100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.090582][T25614] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.105904][T25604] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/789/file0 supports timestamps until 2038 (0x7fffffff) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.207464][T25634] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.230056][T25639] loop1: detected capacity change from 0 to 264192 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.254352][T25647] loop0: detected capacity change from 0 to 264192 [ 266.255354][T25644] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.317300][T25647] EXT4-fs (loop0): inodes count not valid: 67108896 vs 32 01:01:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000020100100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.376761][T25668] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.392357][T25671] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.458188][T25682] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.474462][T25685] loop0: detected capacity change from 0 to 264192 [ 266.494126][T25692] loop1: detected capacity change from 0 to 264192 [ 266.501079][T25685] EXT4-fs (loop0): inodes count not valid: 536870944 vs 32 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.519815][T25699] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000110100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.630321][T25713] loop0: detected capacity change from 0 to 264192 [ 266.658259][T25713] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.684266][T25713] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/792/file0 supports timestamps until 2038 (0x7fffffff) [ 266.704454][T25727] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.707134][T25731] loop1: detected capacity change from 0 to 264192 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000120100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 266.739965][T25738] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.879468][T25762] loop0: detected capacity change from 0 to 264192 [ 266.914836][T25761] loop1: detected capacity change from 0 to 264192 [ 266.924415][T25764] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 266.955043][T25762] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.974897][T25781] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.005459][T25762] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/793/file0 supports timestamps until 2038 (0x7fffffff) 01:01:13 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000140100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.091377][T25799] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.135512][T25812] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.136276][T25809] loop1: detected capacity change from 0 to 264192 [ 267.147504][T25814] loop0: detected capacity change from 0 to 264192 [ 267.174173][T25814] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 267.192192][T25814] System zones: 1-2, 19-19, 35-38, 46-46 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.239754][T25823] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.240838][T25814] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 267.276732][T25830] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.332956][T25814] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/794/file0 supports timestamps until 2038 (0x7fffffff) [ 267.358087][T25846] loop1: detected capacity change from 0 to 264192 [ 267.372261][T25847] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002140100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.413915][T25854] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) [ 267.471949][T25866] loop0: detected capacity change from 0 to 264192 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002150100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 267.528500][T25874] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.550898][T25866] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 [ 267.555560][T25883] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.601404][T25892] loop1: detected capacity change from 0 to 264192 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.646110][T25900] loop0: detected capacity change from 0 to 264192 [ 267.666579][T25902] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 267.672200][T25900] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002160100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 267.738034][T25918] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.834311][T25935] loop1: detected capacity change from 0 to 264192 [ 267.860483][T25941] loop0: detected capacity change from 0 to 264192 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002170100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 267.897704][T25941] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.013968][T25974] loop0: detected capacity change from 0 to 264192 [ 268.041742][T25983] loop1: detected capacity change from 0 to 264192 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.095193][T25974] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000180100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.258969][T26022] loop0: detected capacity change from 0 to 264192 [ 268.278456][T26029] loop1: detected capacity change from 0 to 264192 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.324614][T26022] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002180100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 268.366497][T26022] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/799/file0 supports timestamps until 2038 (0x7fffffff) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.510545][T26074] loop1: detected capacity change from 0 to 264192 [ 268.520851][T26075] loop0: detected capacity change from 0 to 264192 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.553592][T26075] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x56b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000190100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.712557][T26119] loop0: detected capacity change from 0 to 264192 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.764452][T26119] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 268.782594][T26137] loop1: detected capacity change from 0 to 264192 [ 268.794904][T26119] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/801/file0 supports timestamps until 2038 (0x7fffffff) 01:01:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x58b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002190100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.944280][T26166] loop0: detected capacity change from 0 to 264192 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.989535][T26182] loop1: detected capacity change from 0 to 264192 [ 269.008469][T26166] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000021a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 269.093649][T26194] loop1: detected capacity change from 0 to 264192 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.181380][T26209] loop0: detected capacity change from 0 to 264192 [ 269.205257][T26209] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 [ 269.213775][T26221] loop1: detected capacity change from 0 to 264192 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.285733][T26234] loop0: detected capacity change from 0 to 264192 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.330952][T26234] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 269.358203][T26234] System zones: 1-2, 19-19, 35-38, 46-46 [ 269.364452][T26234] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000010200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 269.381446][T26234] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/804/file0 supports timestamps until 2038 (0x7fffffff) [ 269.409256][T26252] loop1: detected capacity change from 0 to 264192 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.564960][T26271] loop0: detected capacity change from 0 to 264192 [ 269.586469][T26271] EXT4-fs (loop0): inodes count not valid: 268435488 vs 32 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.617168][T26293] loop1: detected capacity change from 0 to 264192 01:01:15 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000220100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, 0x0, 0x0) getdents64(r1, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1d0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:15 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.778258][T26325] loop1: detected capacity change from 0 to 264192 [ 269.785899][T26333] loop0: detected capacity change from 0 to 264192 01:01:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:15 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 269.854143][T26333] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 269.899691][T26333] System zones: 1-2, 19-19, 35-38, 46-46 [ 269.933559][T26333] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 269.942306][T26362] loop1: detected capacity change from 0 to 264192 [ 269.945180][T26333] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/806/file0 supports timestamps until 2038 (0x7fffffff) 01:01:16 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000250100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x22e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f00000009c0)=""/4096, 0x1000) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.074121][T26388] loop0: detected capacity change from 0 to 264192 [ 270.109722][T26396] loop1: detected capacity change from 0 to 264192 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.131226][T26388] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 270.187532][T26388] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/807/file0 supports timestamps until 2038 (0x7fffffff) 01:01:16 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.327190][T26438] loop0: detected capacity change from 0 to 264192 [ 270.334138][T26440] loop1: detected capacity change from 0 to 264192 [ 270.363763][T26438] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.426607][T26438] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/808/file0 supports timestamps until 2038 (0x7fffffff) 01:01:16 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000003f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.560792][T26483] loop1: detected capacity change from 0 to 264192 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') r1 = openat(r0, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) [ 270.613044][T26499] loop0: detected capacity change from 0 to 264192 01:01:16 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000400100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.668782][T26499] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 270.695486][T26499] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/809/file0 supports timestamps until 2038 (0x7fffffff) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.741282][T26516] loop1: detected capacity change from 0 to 264192 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.798094][T26534] loop0: detected capacity change from 0 to 264192 01:01:16 executing program 1: shmctl$IPC_STAT(0xffffffffffffffff, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001140), 0xffffffffffffffff) getrandom(&(0x7f0000001bc0)=""/4096, 0x1000, 0x0) 01:01:16 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000460100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.894385][T26534] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 270.912659][T26534] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/810/file0 supports timestamps until 2038 (0x7fffffff) 01:01:17 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)={[{@nocompress}, {@map_acorn}]}) 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000470100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.092451][T26590] ISOFS: Unable to identify CD-ROM format. [ 271.125932][T26604] loop0: detected capacity change from 0 to 264192 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.140981][T26590] ISOFS: Unable to identify CD-ROM format. 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x54000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6_vti0\x00', 0x0}) [ 271.186124][T26604] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 271.213140][T26604] System zones: 1-2, 19-19, 35-38, 46-46 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000480100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x56b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x1, @link_local}, 0x0, {0x2, 0x0, @loopback}, 'veth0_to_batadv\x00'}) [ 271.259389][T26604] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 271.288397][T26604] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/812/file0 supports timestamps until 2038 (0x7fffffff) 01:01:17 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000003600), 0x0, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.356761][T26655] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:17 executing program 1: r0 = getpid() r1 = getpid() r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000000c0)={r3}) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.417526][T26668] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.420574][T26670] loop0: detected capacity change from 0 to 264192 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000490100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000640)={0x48, 0x3, 0x1, 0x3, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}]}, 0x48}}, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.496269][T26670] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 271.508677][T26670] System zones: 1-2, 19-19, 35-38, 46-46 [ 271.517678][T26670] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 271.529015][T26670] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/813/file0 supports timestamps until 2038 (0x7fffffff) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.597182][T26701] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.636575][T26705] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:17 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000040)=""/228, 0xe4) read$char_usb(r0, 0x0, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.663842][T26714] loop0: detected capacity change from 0 to 264192 [ 271.703898][T26714] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 271.724115][T26714] System zones: 1-2, 19-19, 35-38, 46-46 [ 271.740193][T26714] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 271.747517][T26731] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.760722][T26714] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/814/file0 supports timestamps until 2038 (0x7fffffff) 01:01:17 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='limits\x00') read$char_raw(r0, 0x0, 0x0) 01:01:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x105400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.802455][T26740] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:17 executing program 1: timer_create(0x0, &(0x7f0000001240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.874103][T26757] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.910365][T26763] loop0: detected capacity change from 0 to 264192 01:01:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000000)={'macvlan0\x00', @ifru_addrs=@ethernet={0x0, @random}}) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.928934][T26767] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 271.966229][T26763] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004b0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000002900)={0x0, 0x0, &(0x7f00000028c0)={&(0x7f0000002880)={0x14, 0x1, 0x8, 0x101}, 0x14}}, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 271.997349][T26763] System zones: 1-2, 19-19, 35-38, 46-46 [ 272.019220][T26763] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 272.030021][T26763] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/815/file0 supports timestamps until 2038 (0x7fffffff) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.092527][T26797] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.122418][T26809] loop0: detected capacity change from 0 to 264192 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f00000020c0)={0x20, 0x0, 0x7, 0x3, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.134122][T26812] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2e02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = epoll_create(0x9b0a) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x4}) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.215212][T26809] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 272.248752][T26809] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/816/file0 supports timestamps until 2038 (0x7fffffff) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000600100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000)='=', 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002840)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000040)=""/23, 0x17}, {&(0x7f0000000200)=""/129, 0x81}, {&(0x7f00000002c0)=""/159, 0x9f}, {&(0x7f0000002800)=""/15}], 0x4, &(0x7f00000003c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000440)=""/118, 0xffffffffffffffa1}, {&(0x7f00000004c0)=""/204, 0xcc}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/22, 0x16}, {&(0x7f0000002600)=""/104, 0x68}, {&(0x7f0000002680)=""/23, 0x17}, {&(0x7f00000026c0)=""/141, 0x8d}], 0x8, &(0x7f0000002800)}}], 0x2, 0x0, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4af000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.345627][T26854] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.402909][T26870] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.414744][T26868] loop0: detected capacity change from 0 to 264192 [ 272.438988][T26868] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4fd000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: socket(0x1, 0x0, 0x5120) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000680100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.484607][T26868] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/818/file0 supports timestamps until 2038 (0x7fffffff) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.543538][T26891] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x541000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x21, 0x0, &(0x7f0000000480)) [ 272.589114][T26907] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.623669][T26912] loop0: detected capacity change from 0 to 264192 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.676543][T26912] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001c80)) [ 272.716839][T26912] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/819/file0 supports timestamps until 2038 (0x7fffffff) 01:01:18 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x550000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.760966][T26938] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.789145][T26947] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x610002, 0x0) 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:18 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x570000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.836794][T26955] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.857732][T26956] loop0: detected capacity change from 0 to 264192 01:01:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x970000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffe) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb402}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.885452][T26963] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 272.923253][T26956] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:19 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000740100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb456}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd04f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 272.986661][T26956] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/820/file0 supports timestamps until 2038 (0x7fffffff) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='net/vlan/vlan0\x00') 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.064113][T27002] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 273.102111][T27013] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf04a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000001dc0)='ns/pid\x00') ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) [ 273.130660][T27018] loop0: detected capacity change from 0 to 264192 [ 273.156366][T27018] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0ff1f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.176048][T27018] System zones: 1-2, 19-19, 35-38, 46-46 [ 273.201108][T27018] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 273.234050][T27037] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 273.254285][T27018] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/821/file0 supports timestamps until 2038 (0x7fffffff) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: mq_open(&(0x7f00000007c0)='ip6tnl0\x00', 0x0, 0x0, 0x0) 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000002750100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 273.275119][T27045] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.352149][T27061] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.395694][T27064] loop0: detected capacity change from 0 to 264192 [ 273.406338][T27074] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 273.428609][T27064] EXT4-fs (loop0): inodes count not valid: 33554464 vs 32 01:01:19 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0xc, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.495620][T27085] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 273.519655][T27089] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000001c80)='ns/uts\x00') 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.569246][T27102] loop0: detected capacity change from 0 to 264192 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.613539][T27102] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 273.621973][T27102] System zones: 1-2, 19-19, 35-38, 46-46 [ 273.636110][T27102] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 273.639231][T27118] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x713180, 0x0) 01:01:19 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000018a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 273.652306][T27102] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/823/file0 supports timestamps until 2038 (0x7fffffff) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3045000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: clone(0x4008000, 0x0, 0x0, 0x0, 0x0) [ 273.707376][T27128] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.784043][T27142] loop0: detected capacity change from 0 to 264192 01:01:19 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:19 executing program 1: getrusage(0x0, &(0x7f0000001c80)) 01:01:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.847943][T27142] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: unlinkat(0xffffffffffffff9c, &(0x7f0000001c80)='./file0\x00', 0x200) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.970627][T27183] loop0: detected capacity change from 0 to 264192 [ 274.009548][T27183] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: mq_notify(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x2, @thr={0x0, 0x0}}) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.070976][T27183] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/825/file0 supports timestamps until 2038 (0x7fffffff) 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x6e6bbb}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, 0xe8) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.226496][T27241] loop0: detected capacity change from 0 to 264192 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.290099][T27241] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 274.310920][T27241] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/826/file0 supports timestamps until 2038 (0x7fffffff) 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000900100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000004c0)) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: io_setup(0xe63c, &(0x7f0000000000)) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.475022][T27288] loop0: detected capacity change from 0 to 264192 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.528941][T27288] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000910100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.569248][T27288] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/827/file0 supports timestamps until 2038 (0x7fffffff) 01:01:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xff) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000dc0)='attr/keycreate\x00') write$tcp_congestion(r0, 0x0, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.696260][T27341] loop0: detected capacity change from 0 to 264192 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.748321][T27341] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:20 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000920100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:20 executing program 1: socketpair(0xa, 0x3, 0x7b, 0x0) 01:01:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.798492][T27341] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/828/file0 supports timestamps until 2038 (0x7fffffff) 01:01:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: capget(0x0, &(0x7f0000000140)) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 274.919608][T27390] loop0: detected capacity change from 0 to 264192 01:01:21 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000001040)='/sys/kernel/rcu_normal', 0x4000, 0x0) [ 274.983264][T27390] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 275.015955][T27390] System zones: 1-2, 19-19, 35-38, 46-46 [ 275.022314][T27390] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e40100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$P9_RFSYNC(r0, &(0x7f0000000140)={0x7}, 0xfffffd40) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.033224][T27390] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/829/file0 supports timestamps until 2038 (0x7fffffff) 01:01:21 executing program 1: r0 = socket(0x11, 0xa, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000200), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.121042][T27428] loop0: detected capacity change from 0 to 264192 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.172048][T27428] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e60100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast2, @private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000008}) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.307542][T27469] loop0: detected capacity change from 0 to 264192 [ 275.344967][T27469] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:21 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e70100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x13000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: capget(&(0x7f0000000100)={0x20080522}, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ffff000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.483125][T27515] loop0: detected capacity change from 0 to 264192 01:01:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 275.537028][T27515] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e80100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 1: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4f847b6caee3aef1, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mbind(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x0, 0x0, 0x0, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x21000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.687489][T27558] loop0: detected capacity change from 0 to 264192 [ 275.714228][T27558] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:21 executing program 1: r0 = fork() waitid(0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)) rt_sigqueueinfo(r0, 0xf, &(0x7f0000000100)={0x0, 0x0, 0xfffff001}) 01:01:21 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001e90100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 275.829643][T27586] loop0: detected capacity change from 0 to 264192 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}}, &(0x7f0000000100)) [ 275.901988][T27586] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000008, 0xffffffffffffffff) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001ea0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: clock_settime(0x0, &(0x7f0000001200)) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000)="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", 0xffffffffffffff78, 0x200040c4, 0x0, 0x0) [ 276.058203][T27636] loop0: detected capacity change from 0 to 264192 [ 276.087387][T27636] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: set_mempolicy(0x8001, &(0x7f0000000000)=0x2, 0x401) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000001eb0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}}, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002180)={{{@in6=@empty, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @dev}}}, 0xe8) [ 276.235619][T27674] loop0: detected capacity change from 0 to 264192 [ 276.263119][T27674] EXT4-fs (loop0): inodes count not valid: 16777248 vs 32 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000fff0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000011c0)) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.379065][T27707] loop0: detected capacity change from 0 to 264192 01:01:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, 0x0, 0xfffffffffffffd41) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.435422][T27707] EXT4-fs (loop0): inodes count not valid: 251658272 vs 32 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.600009][T27747] loop0: detected capacity change from 0 to 264192 01:01:22 executing program 1: r0 = epoll_create1(0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xb0000006}) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.646683][T27747] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 276.711081][T27747] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/838/file0 supports timestamps until 2038 (0x7fffffff) 01:01:22 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000020400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x1, 0x7, 0x101}, 0x14}}, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='reno\x00', 0x1) 01:01:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.884073][T27813] loop0: detected capacity change from 0 to 264192 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000001000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.929927][T27813] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 276.965788][T27813] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/839/file0 supports timestamps until 2038 (0x7fffffff) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: epoll_create(0x4) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: clock_adjtime(0x0, &(0x7f0000000100)={0x7ff}) [ 277.094541][T27862] loop0: detected capacity change from 0 to 264192 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000002000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, r0+60000000}}, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.152756][T27862] EXT4-fs (loop0): inodes count not valid: 32 vs 256 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/nfsfs\x00') 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.276132][T27902] loop0: detected capacity change from 0 to 264192 [ 277.311622][T27902] EXT4-fs (loop0): inodes count not valid: 32 vs 512 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000003000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') getdents64(r0, &(0x7f0000000100)=""/4096, 0x1000) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = socket(0xa, 0x2, 0x0) bind$unix(r0, 0x0, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.426219][T27935] loop0: detected capacity change from 0 to 264192 [ 277.452340][T27935] EXT4-fs (loop0): bad geometry: block count 196608 exceeds size of device (132096 blocks) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000004000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) mq_open(&(0x7f0000000080)=',\x00', 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001640)='net/packet\x00') 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001e80)={&(0x7f0000001e00)={0x1c, 0x8, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 277.600289][T27974] loop0: detected capacity change from 0 to 264192 [ 277.626377][T27974] EXT4-fs (loop0): bad geometry: block count 262144 exceeds size of device (132096 blocks) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2e020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000005000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x4, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 01:01:23 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/ipv6_route\x00') 01:01:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x56b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.786029][T28015] loop0: detected capacity change from 0 to 264192 [ 277.809171][T28015] EXT4-fs (loop0): bad geometry: block count 327680 exceeds size of device (132096 blocks) 01:01:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:23 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000013000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 1: r0 = socket(0x10, 0x2, 0x0) connect$unix(r0, &(0x7f0000002a80)=@abs, 0x6e) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.940608][T28048] loop0: detected capacity change from 0 to 264192 [ 277.969518][T28048] EXT4-fs (loop0): bad geometry: block count 1245184 exceeds size of device (132096 blocks) 01:01:24 executing program 1: clone(0xa0061200, 0x0, 0x0, 0x0, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000000008b000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.129558][T28088] loop0: detected capacity change from 0 to 264192 [ 278.153143][T28088] EXT4-fs (loop0): bad geometry: block count 9109504 exceeds size of device (132096 blocks) 01:01:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x2, 0x7, 0x301}, 0x14}}, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000000008c000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: r0 = socket(0xa, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x6060, 0x0, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x54b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.309684][T28126] loop0: detected capacity change from 0 to 264192 [ 278.347223][T28126] EXT4-fs (loop0): bad geometry: block count 9175040 exceeds size of device (132096 blocks) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: uname(&(0x7f0000000140)=""/177) io_setup(0x0, &(0x7f0000000200)) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000000008d000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/slabinfo\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000040)=""/214, 0xfffffd73) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b33a20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='ns\x00') getdents64(r0, &(0x7f00000000c0)=""/4096, 0x1000) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.514089][T28179] loop0: detected capacity change from 0 to 264192 [ 278.531768][T28179] EXT4-fs (loop0): bad geometry: block count 9240576 exceeds size of device (132096 blocks) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000092000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='ns\x00') getdents64(r0, &(0x7f00000000c0)=""/4096, 0x1000) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.675959][T28206] loop0: detected capacity change from 0 to 264192 01:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='ns\x00') getdents64(r0, &(0x7f00000000c0)=""/4096, 0x1000) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.719093][T28206] EXT4-fs (loop0): bad geometry: block count 9568256 exceeds size of device (132096 blocks) 01:01:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000020000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='ns\x00') getdents64(r0, &(0x7f00000000c0)=""/4096, 0x1000) 01:01:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000340)="d7b03c18eaa371453f85311d84086e83", 0x10) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.886845][T28248] loop0: detected capacity change from 0 to 264192 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.937607][T28248] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 278.947856][T28248] EXT4-fs (loop0): group descriptors corrupted! 01:01:25 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x4000000) 01:01:25 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000030000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x550000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendto$unix(r0, &(0x7f0000000180)="04", 0x1, 0x0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg(r0, &(0x7f00000012c0)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x570000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.120117][T28300] loop0: detected capacity change from 0 to 264192 [ 279.137704][T28300] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 279.147931][T28300] EXT4-fs (loop0): group descriptors corrupted! 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000040000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f141457a000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x2, 0x9, 0x301}, 0x14}}, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f141457b000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x14, 0x3, 0x1, 0x801}, 0x14}}, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f141459b000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.321634][T28337] loop0: detected capacity change from 0 to 264192 [ 279.353607][T28337] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 279.364009][T28337] EXT4-fs (loop0): group descriptors corrupted! 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000050000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000001900)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f141459c000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd0010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, 0x0) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.517069][T28385] loop0: detected capacity change from 0 to 264192 [ 279.553675][T28385] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f14145bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) [ 279.563929][T28385] EXT4-fs (loop0): group descriptors corrupted! 01:01:25 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000130000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f14147bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000001180)=@file={0x1, './file0\x00'}, 0x6e) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f14149bc000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x970000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:25 executing program 1: clone(0x90126500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fallocate(r0, 0x0, 0x102000006, 0x6) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = getpid() tkill(r1, 0x37) 01:01:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.762771][T28432] loop0: detected capacity change from 0 to 264192 [ 279.805703][T28432] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 279.816025][T28432] EXT4-fs (loop0): group descriptors corrupted! [ 279.848640][ T25] audit: type=1400 audit(1626138085.932:64): avc: denied { sys_admin } for pid=28444 comm="syz-executor.1" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa2331b000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="85", 0x1}, {0x0}], 0x2}, 0x0) [ 279.883547][ T25] audit: type=1400 audit(1626138085.962:65): avc: denied { dac_read_search } for pid=28461 comm="syz-executor.1" capability=2 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 279.911143][ T25] audit: type=1400 audit(1626138085.962:66): avc: denied { dac_override } for pid=28461 comm="syz-executor.1" capability=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: recvfrom$unix(0xffffffffffffffff, &(0x7f00000010c0)=""/4096, 0xfffffffffffffe53, 0x0, &(0x7f0000001040)=@file={0x0, './file0\x00'}, 0xffffffffffffffa9) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.002299][T28484] loop0: detected capacity change from 0 to 264192 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.051539][T28484] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 280.072450][T28484] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/855/file0 supports timestamps until 2038 (0x7fffffff) 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008b0000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:26 executing program 1: socket$packet(0x11, 0x4a133f06379f9d3d, 0x300) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = open(&(0x7f0000000280)='./file0\x00', 0x200, 0x0) close(r0) [ 280.203691][T28532] loop0: detected capacity change from 0 to 264192 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.245372][T28532] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 280.276939][T28532] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/856/file0 supports timestamps until 2038 (0x7fffffff) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008c0000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:26 executing program 1: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x100000001}, 0x0, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.304608][T28554] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.335681][T28560] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) poll(&(0x7f00000000c0)=[{r0, 0x4}], 0x1, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10400000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001080), 0x2) [ 280.407257][T28579] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.438697][T28588] loop0: detected capacity change from 0 to 264192 [ 280.446379][T28591] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.476127][T28588] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10540000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r0) getsockname$inet6(r0, 0x0, 0x0) 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008d0000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 280.533000][T28588] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/857/file0 supports timestamps until 2038 (0x7fffffff) 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.581116][T28616] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:26 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(r0, 0x0, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb454}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.633214][T28622] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.651369][T28634] loop0: detected capacity change from 0 to 264192 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb458}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.680508][T28634] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, 0x0, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000920000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.722541][T28634] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/858/file0 supports timestamps until 2038 (0x7fffffff) 01:01:26 executing program 1: pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0x8, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.800543][T28669] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:26 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x50040300000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:26 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.847508][T28681] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.860216][T28683] loop0: detected capacity change from 0 to 264192 01:01:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0xf61fe44bff3c9334, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa05714147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.902634][T28693] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 280.926693][T28683] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000020100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.941977][T28683] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/859/file0 supports timestamps until 2038 (0x7fffffff) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: setitimer(0x0, &(0x7f00000000c0)={{}, {0x0, 0xfffffffffffff4f2}}, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb05714147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 280.981122][T28709] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000004000)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.033994][T28722] loop0: detected capacity change from 0 to 264192 [ 281.065920][T28722] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000030100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb05914147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.084784][T28722] System zones: 1-2, 19-19, 35-38, 46-46 [ 281.094436][T28722] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.106969][T28722] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/860/file0 supports timestamps until 2038 (0x7fffffff) [ 281.113700][T28739] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r1, r0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.178624][T28739] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000040)=@in, 0xc) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc05914147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.221889][T28758] loop0: detected capacity change from 0 to 264192 [ 281.246147][T28762] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.258794][T28758] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.295230][T28758] System zones: 1-2, 19-19, 35-38, 46-46 [ 281.307126][T28758] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.318453][T28758] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/861/file0 supports timestamps until 2038 (0x7fffffff) 01:01:27 executing program 1: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1011, 0xffffffffffffff9c, 0x0) 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000040100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.338330][T28779] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc05b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) lseek(r0, 0x0, 0x0) [ 281.416761][T28796] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.424781][T28795] loop0: detected capacity change from 0 to 264192 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc07b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000040)=[{0x0}], 0x1) r1 = getgid() fchown(r0, 0xffffffffffffffff, r1) [ 281.465257][T28795] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 281.493960][T28812] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000050100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 281.510605][T28795] System zones: 1-2, 19-19, 35-38, 46-46 [ 281.519274][T28795] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.530608][T28795] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/862/file0 supports timestamps until 2038 (0x7fffffff) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc09b14147f0000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000004040), 0x10) [ 281.578344][T28828] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.591445][T28832] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd04f0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.651070][T28846] loop0: detected capacity change from 0 to 264192 01:01:27 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCMSET(r0, 0x8004746d, &(0x7f0000000300)) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.694807][T28858] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.697497][T28846] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 281.718888][T28863] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf04a0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000060100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:27 executing program 1: pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf0ff1f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.791553][T28846] System zones: 1-2, 19-19, 35-38, 46-46 [ 281.797907][T28846] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.811058][T28846] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/863/file0 supports timestamps until 2038 (0x7fffffff) 01:01:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.878214][T28896] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.922727][T28899] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 281.939860][T28908] loop0: detected capacity change from 0 to 264192 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000070100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000740)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.975714][T28908] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 281.998414][T28908] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/864/file0 supports timestamps until 2038 (0x7fffffff) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000040)=[{0x0}], 0x1) fchown(r0, 0xffffffffffffffff, 0x0) [ 282.072016][T28936] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.104020][T28934] loop0: detected capacity change from 0 to 264192 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: poll(0x0, 0x0, 0x2) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.132370][T28946] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.173989][T28934] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000080100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup2(r1, r0) [ 282.217895][T28934] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/865/file0 supports timestamps until 2038 (0x7fffffff) [ 282.232825][T28968] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(r0, 0x0, 0x0) [ 282.279185][T28978] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@cred], 0x20}, 0x0) [ 282.343113][T28993] loop0: detected capacity change from 0 to 264192 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000090100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x25000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x100, 0x0, 0x0) [ 282.397481][T28993] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 282.418285][T28993] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/866/file0 supports timestamps until 2038 (0x7fffffff) [ 282.420765][T29014] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 1: writev(0xffffffffffffffff, &(0x7f0000001080), 0x2) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.478833][T29018] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)='%', 0x1}], 0x4}, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.548121][T29036] loop0: detected capacity change from 0 to 264192 [ 282.553697][T29044] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.582376][T29036] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.625899][T29036] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/867/file0 supports timestamps until 2038 (0x7fffffff) [ 282.657239][T29060] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x39030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) [ 282.714128][T29077] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.735152][T29082] loop0: detected capacity change from 0 to 264192 01:01:28 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 1: clock_getres(0x636de1c172a9d307, 0x0) [ 282.760970][T29087] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.775926][T29082] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:28 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000b0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.817279][T29082] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/868/file0 supports timestamps until 2038 (0x7fffffff) 01:01:28 executing program 1: semctl$SETVAL(0x0, 0x0, 0x8, &(0x7f0000000180)) 01:01:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.885369][T29109] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 282.897749][T29113] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x10004) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/185, 0xb9}], 0x1) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 282.960965][T29128] loop0: detected capacity change from 0 to 264192 [ 282.982106][T29128] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 282.994541][T29128] System zones: 1-2, 19-19, 35-38, 46-46 01:01:29 executing program 1: select(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) [ 283.017293][T29128] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 283.018127][T29138] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.028423][T29128] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/869/file0 supports timestamps until 2038 (0x7fffffff) 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7}, &(0x7f0000000140)) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.124332][T29157] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f00000002c0)=[{&(0x7f0000000080)="fa164fbfda20a3665d186c4a53aa1b47d8fdc40b5d4750b1a9ef1e", 0x1b}, {&(0x7f00000000c0)="b6d3bc897d5a431e6d3159ce669758c13e56085e73d206bdb3ef1956c6dc801a660daa25cd2fb892575b5d13dd80c2a338b4227de1cf3642f3f97abbb36d1a651f6257114a6a5da1cb991ec50a811fd96cda56a94f80c4b50a3b5921fd443472e469ae56b9ceca82306e8403973b599938b596847666", 0x76}, {0x0}, {&(0x7f00000001c0)='%', 0x1}], 0x4, &(0x7f0000000340)=[@cred], 0x20}, 0x3) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x56b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.195481][T29174] loop0: detected capacity change from 0 to 264192 [ 283.223978][T29184] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.267817][T29174] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 283.280281][T29174] System zones: 1-2, 19-19, 35-38, 46-46 [ 283.300178][T29174] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000d0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.300470][T29198] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.311264][T29174] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/870/file0 supports timestamps until 2038 (0x7fffffff) 01:01:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)="fa", 0x1}, {0x0}, {&(0x7f00000001c0)='%', 0x1}], 0x3}, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@in={0x2, 0x3}, 0xc) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58b4ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.414693][T29216] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.428172][T29224] loop0: detected capacity change from 0 to 264192 [ 283.439867][T29228] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.501197][T29224] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 283.516543][T29224] System zones: 1-2, 19-19, 35-38, 46-46 [ 283.536754][T29224] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 1: semget(0x2, 0x2, 0x755) 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x60000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000), 0x10) [ 283.557703][T29224] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/871/file0 supports timestamps until 2038 (0x7fffffff) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00\xddu\x8b\x95\x9c#\xa4\x13\x1e\x04G}\xa8\xeb\xf7\xcf\xbfT\xbf7\x108\x8d\x16\xe7\x91=\x90\xe6J\x8c\xad\x81\xf3\xb8i\x1b\x96=0\xf0,\xea\x03-\x15j\bQA\x92#\xdcF\x03i\x90x\xd3\xffY\x15]\x00\xd4\xc0\xcf\xc0\xebu\xdb\xc3o\xc1\xadu\xa6\xd69Wi\x17\xa6\x0e\xd65\xa0\xe6\"\xc9\xa3V\xbe`\xceV\xc0\xef\xc4\xe8\xbd\x81\xe6\xca\x0etQ\x8b .t\x01\'1o\xe4\x03SY\xc8U\xfbW\x9cG\x8dM\xbcn\xc2\'Y\r\xbc/\xfe\xfeh\x84}\xaef\x87x\xf3Ob\x1b\x85\x8a*{\x1d', 0x5) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) ftruncate(r0, 0x1000000) mmap(&(0x7f000074a000/0x2000)=nil, 0x2000, 0x3000006, 0x10, r0, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.639214][T29266] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00\xddu\x8b\x95\x9c#\xa4\x13\x1e\x04G}\xa8\xeb\xf7\xcf\xbfT\xbf7\x108\x8d\x16\xe7\x91=\x90\xe6J\x8c\xad\x81\xf3\xb8i\x1b\x96=0\xf0,\xea\x03-\x15j\bQA\x92#\xdcF\x03i\x90x\xd3\xffY\x15]\x00\xd4\xc0\xcf\xc0\xebu\xdb\xc3o\xc1\xadu\xa6\xd69Wi\x17\xa6\x0e\xd65\xa0\xe6\"\xc9\xa3V\xbe`\xceV\xc0\xef\xc4\xe8\xbd\x81\xe6\xca\x0etQ\x8b .t\x01\'1o\xe4\x03SY\xc8U\xfbW\x9cG\x8dM\xbcn\xc2\'Y\r\xbc/\xfe\xfeh\x84}\xaef\x87x\xf3Ob\x1b\x85\x8a*{\x1d', 0x5) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) ftruncate(r0, 0x1000000) mmap(&(0x7f000074a000/0x2000)=nil, 0x2000, 0x3000006, 0x10, r0, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.698652][T29275] loop0: detected capacity change from 0 to 264192 [ 283.711003][T29278] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.735176][T29275] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] 01:01:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 1: r0 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000040)='source', &(0x7f0000000080)='[\x9d.{+-:\x00', 0xffffffff00000000) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.758200][T29275] System zones: 1-2, 19-19, 35-38, 46-46 [ 283.766838][T29275] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 283.779215][T29275] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/873/file0 supports timestamps until 2038 (0x7fffffff) 01:01:29 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000100100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x54, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x54}}, 0x0) 01:01:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.851887][T29310] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 283.868254][T29314] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.921416][T29331] loop0: detected capacity change from 0 to 264192 [ 283.954625][T29331] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: r0 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000040)='source', &(0x7f0000000080)='[\x9d.{+-:\x00', 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 283.981071][T29331] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/874/file0 supports timestamps until 2038 (0x7fffffff) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000110100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 284.021686][T29346] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140)) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.076330][T29365] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.134884][T29368] loop0: detected capacity change from 0 to 264192 [ 284.148244][T29381] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}, 0x0) 01:01:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000040)='source', &(0x7f0000000080)='[\x9d.{+-:\x00', 0x0) 01:01:30 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000120100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 284.174795][T29368] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 284.192183][T29368] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/875/file0 supports timestamps until 2038 (0x7fffffff) [ 284.222462][T29387] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2e02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x48, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) [ 284.315558][T29410] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 284.332100][T29420] loop0: detected capacity change from 0 to 264192 [ 284.347054][T29426] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.359577][T29420] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.413841][T29420] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/876/file0 supports timestamps until 2038 (0x7fffffff) 01:01:30 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002cbd7000000000001f0000", @ANYRES32=r3], 0x24}}, 0x0) 01:01:30 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000140100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.486317][T29454] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.527375][T29462] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.580982][T29458] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 284.599543][T29478] loop0: detected capacity change from 0 to 264192 [ 284.614192][T29486] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.641756][T29478] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 284.663735][T29478] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/877/file0 supports timestamps until 2038 (0x7fffffff) [ 284.676457][T29500] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00\xddu\x8b\x95\x9c#\xa4\x13\x1e\x04G}\xa8\xeb\xf7\xcf\xbfT\xbf7\x108\x8d\x16\xe7\x91=\x90\xe6J\x8c\xad\x81\xf3\xb8i\x1b\x96=0\xf0,\xea\x03-\x15j\bQA\x92#\xdcF\x03i\x90x\xd3\xffY\x15]\x00\xd4\xc0\xcf\xc0\xebu\xdb\xc3o\xc1\xadu\xa6\xd69Wi\x17\xa6\x0e\xd65\xa0\xe6\"\xc9\xa3V\xbe`\xceV\xc0\xef\xc4\xe8\xbd\x81\xe6\xca\x0etQ\x8b .t\x01\'1o\xe4\x03SY\xc8U\xfbW\x9cG\x8dM\xbcn\xc2\'Y\r\xbc/\xfe\xfeh\x84}\xaef\x87x\xf3Ob\x1b\x85\x8a*{\x1d', 0x5) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) ftruncate(r0, 0x1000000) mmap(&(0x7f000074a000/0x2000)=nil, 0x2000, 0x3000006, 0x10, r0, 0x0) 01:01:30 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000180100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.712141][T29508] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.777208][T29518] loop0: detected capacity change from 0 to 264192 01:01:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(0xffffffffffffffff, r2, 0x0) dup3(r1, r0, 0x0) 01:01:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.816836][T29530] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 284.844633][T29518] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.871063][T29536] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 284.888126][T29518] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/878/file0 supports timestamps until 2038 (0x7fffffff) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000190100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x54b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.954174][T29554] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.011478][T29565] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.058689][T29573] loop0: detected capacity change from 0 to 264192 [ 285.093167][T29580] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.107468][T29573] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 285.116601][T29573] System zones: 1-2, 19-19, 35-38, 46-46 [ 285.123110][T29585] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.144164][T29573] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 285.169159][T29573] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/879/file0 supports timestamps until 2038 (0x7fffffff) 01:01:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a76322000600"}) r1 = syz_open_pts(r0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) dup3(0xffffffffffffffff, r2, 0x0) dup3(r1, r0, 0x0) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000220100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.248646][T29598] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.287845][T29607] loop0: detected capacity change from 0 to 264192 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.295139][T29611] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.319711][T29607] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 285.331391][T29607] System zones: 1-2, 19-19, 35-38, 46-46 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffff5e00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.355663][T29607] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.405683][T29628] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 1: r0 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00\xddu\x8b\x95\x9c#\xa4\x13\x1e\x04G}\xa8\xeb\xf7\xcf\xbfT\xbf7\x108\x8d\x16\xe7\x91=\x90\xe6J\x8c\xad\x81\xf3\xb8i\x1b\x96=0\xf0,\xea\x03-\x15j\bQA\x92#\xdcF\x03i\x90x\xd3\xffY\x15]\x00\xd4\xc0\xcf\xc0\xebu\xdb\xc3o\xc1\xadu\xa6\xd69Wi\x17\xa6\x0e\xd65\xa0\xe6\"\xc9\xa3V\xbe`\xceV\xc0\xef\xc4\xe8\xbd\x81\xe6\xca\x0etQ\x8b .t\x01\'1o\xe4\x03SY\xc8U\xfbW\x9cG\x8dM\xbcn\xc2\'Y\r\xbc/\xfe\xfeh\x84}\xaef\x87x\xf3Ob\x1b\x85\x8a*{\x1d', 0x5) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) ftruncate(r0, 0x1000000) mmap(&(0x7f000074a000/0x2000)=nil, 0x2000, 0x3000006, 0x10, r0, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb456}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.441707][T29607] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/880/file0 supports timestamps until 2038 (0x7fffffff) 01:01:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r0, &(0x7f00000012c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000001340)=0x80) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, 0x0) 01:01:31 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000250100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.484519][T29636] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffb458}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 1: syz_mount_image$tmpfs(&(0x7f0000001dc0), &(0x7f0000001e00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000031c0)={[{@size}]}) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.548302][T29656] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.584541][T29663] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.615404][T29671] tmpfs: Bad value for 'size' 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.640513][T29676] loop0: detected capacity change from 0 to 264192 [ 285.651549][T29671] tmpfs: Bad value for 'size' [ 285.669605][T29676] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x15, 0x0, &(0x7f00000002c0)) [ 285.680974][T29681] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.686982][T29676] System zones: 1-2, 19-19, 35-38, 46-46 [ 285.715415][T29676] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:31 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000380)) 01:01:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.736801][T29694] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.766760][T29676] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/881/file0 supports timestamps until 2038 (0x7fffffff) 01:01:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.839782][T29715] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 285.879427][T29726] loop0: detected capacity change from 0 to 264192 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000500), &(0x7f0000000540)={0x8}, 0x0, 0x0, 0x0) [ 285.886267][T29727] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 285.935950][T29726] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 285.981258][T29726] System zones: 1-2, 19-19, 35-38, 46-46 [ 286.002127][T29726] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000460100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@broadcast, @local}, 0xc) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) socketpair(0x11, 0x2, 0x9, 0x0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.018567][T29726] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/882/file0 supports timestamps until 2038 (0x7fffffff) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd001000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.074600][T29765] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.112462][T29773] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.124379][T29778] loop0: detected capacity change from 0 to 264192 [ 286.185188][T29778] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 286.203498][T29796] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.218020][T29778] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/883/file0 supports timestamps until 2038 (0x7fffffff) 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000470100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {0x0}], 0x2}, 0x0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.251187][T29802] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f000000ff80), 0x0, 0x0) timerfd_gettime(r0, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.322061][T29820] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.346637][T29817] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.359522][T29821] loop0: detected capacity change from 0 to 264192 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000480100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:32 executing program 1: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x1000000) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.374693][T29821] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/884/file0 supports timestamps until 2038 (0x7fffffff) [ 286.389867][T29831] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.412107][T29834] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x9}, 0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.482556][T29847] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.497774][T29852] loop0: detected capacity change from 0 to 264192 [ 286.520644][T29850] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000700)='/sys/block/loop0', 0x305000, 0x0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000490100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 286.546927][T29860] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.558869][T29852] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/885/file0 supports timestamps until 2038 (0x7fffffff) [ 286.581523][T29867] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000300)=@buf={0x0, &(0x7f00000002c0)}) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000dc0)={&(0x7f0000000b40), 0xc, &(0x7f0000000d80)={&(0x7f0000000440)={0xa8, r1, 0x701, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x4}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0xe, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS]}]}, 0xa8}}, 0x0) [ 286.633566][T29874] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.663722][T29884] loop0: detected capacity change from 0 to 264192 [ 286.670687][T29881] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.698732][T29884] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/886/file0 supports timestamps until 2038 (0x7fffffff) [ 286.719189][T29891] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:32 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.755424][T29894] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, 0x0, 0x0, r0) 01:01:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:32 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004b0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 286.805039][T29907] loop0: detected capacity change from 0 to 264192 [ 286.821832][T29907] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/887/file0 supports timestamps until 2038 (0x7fffffff) [ 286.837032][T29914] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:32 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000500)) [ 286.868502][T29920] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.906173][T29921] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.919809][T29928] loop0: detected capacity change from 0 to 264192 [ 286.939870][T29935] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.966191][T29941] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 286.967331][T29928] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/888/file0 supports timestamps until 2038 (0x7fffffff) [ 286.997459][T29944] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000d00)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000cc0)={0x0}}, 0x0) 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) gettid() timer_create(0x8, 0x0, &(0x7f0000000040)) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.073799][T29950] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.118065][T29962] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) [ 287.172822][T29983] loop0: detected capacity change from 0 to 264192 [ 287.178031][T29982] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.209412][T29983] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.231867][T29983] System zones: 1-2, 19-19, 35-38, 46-46 [ 287.261624][T30000] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.280025][T29983] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/889/file0 supports timestamps until 2038 (0x7fffffff) [ 287.297040][T29999] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000600100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.346708][T30012] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 1: socketpair(0x1d, 0x0, 0x3f, &(0x7f0000000240)) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.391754][T30023] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$inet(r0, &(0x7f0000007c40)=[{{&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, 0x0}}], 0x1, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5effff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.454206][T30041] loop0: detected capacity change from 0 to 264192 [ 287.465222][T30038] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.485041][T30041] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 287.496746][T30041] System zones: 1-2, 19-19, 35-38, 46-46 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.502882][T30042] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.521206][T30041] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/890/file0 supports timestamps until 2038 (0x7fffffff) [ 287.531097][T30043] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x6e466000) 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000680100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.548998][T30053] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.583997][T30055] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000003c40)={'bond0\x00', @ifru_hwaddr=@dev}) bind$packet(r0, &(0x7f0000000040)={0x11, 0xd, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) [ 287.642994][T30071] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.657119][T30073] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.680358][T30078] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006c0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:33 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00', 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0xa) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x8ad6, 0x3000000, '\x00', [{}, {0x801}]}) [ 287.692800][T30081] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.704283][T30082] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.725281][T30091] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.784024][T30103] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.796343][T30105] loop0: detected capacity change from 0 to 264192 [ 287.806701][T30104] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:33 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000740100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 287.827039][T30105] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c018, mo2=0006] [ 287.838599][T30113] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.841157][T30105] System zones: 1-2, 19-19, 35-38, 46-46 [ 287.857411][T30105] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/892/file0 supports timestamps until 2038 (0x7fffffff) [ 287.870310][T30114] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.898022][T30117] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.922313][T30122] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 287.934035][T30125] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = timerfd_create(0x0, 0x0) dup3(r0, r1, 0x0) 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.962211][T30130] loop0: detected capacity change from 0 to 264192 [ 287.973163][T30134] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007a0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.999506][T30130] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/893/file0 supports timestamps until 2038 (0x7fffffff) [ 288.024482][T30139] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000180)='syzkaller\x00', 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.066675][T30142] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.081021][T30153] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.094017][T30152] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008e0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 288.126660][T30156] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.139296][T30163] loop0: detected capacity change from 0 to 264192 [ 288.148506][T30165] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.161721][T30163] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/894/file0 supports timestamps until 2038 (0x7fffffff) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.220109][T30173] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.247067][T30182] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.277885][T30185] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.284844][T30178] loop0: detected capacity change from 0 to 264192 [ 288.302065][T30197] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.317794][T30178] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/895/file0 supports timestamps until 2038 (0x7fffffff) [ 288.347179][T30196] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000008f0100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.374164][T30206] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.418507][T30212] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.442000][T30213] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.482834][T30226] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.496067][T30229] loop0: detected capacity change from 0 to 264192 [ 288.507657][T30231] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.535534][T30229] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/896/file0 supports timestamps until 2038 (0x7fffffff) [ 288.541923][T30233] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000900100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.587346][T30245] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.605432][T30247] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.638700][T30249] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.655080][T30259] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.690777][T30263] loop0: detected capacity change from 0 to 264192 [ 288.708871][T30257] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:34 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.734619][T30263] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/897/file0 supports timestamps until 2038 (0x7fffffff) [ 288.737947][T30267] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000910100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.825373][T30286] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.842479][T30287] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.854767][T30289] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.869603][T30298] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 288.913107][T30305] loop0: detected capacity change from 0 to 264192 [ 288.919635][T30296] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 288.968815][T30316] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 288.983905][T30305] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/898/file0 supports timestamps until 2038 (0x7fffffff) 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000920100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.014118][T30316] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.052756][T30329] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 289.102988][T30335] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.118196][T30341] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.137017][T30348] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.149205][T30350] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.155821][T30345] loop0: detected capacity change from 0 to 264192 [ 289.163006][T30351] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.241141][T30365] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.267007][T30345] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 289.267568][T30368] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 289.290475][T30345] System zones: 1-2, 19-19, 35-38, 46-46 [ 289.300544][T30345] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/899/file0 supports timestamps until 2038 (0x7fffffff) [ 289.315642][T30373] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.327890][T30369] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.339277][T30380] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.376902][T30391] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2a03000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.388309][T30387] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.418938][T30392] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.462171][T30401] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3903000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.503620][T30413] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.524684][T30414] loop0: detected capacity change from 0 to 264192 [ 289.532841][T30415] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 289.549345][T30412] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.569148][T30414] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 289.585207][T30414] System zones: 1-2, 19-19, 35-38, 46-46 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.593320][T30414] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/900/file0 supports timestamps until 2038 (0x7fffffff) [ 289.594098][T30427] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 289.644674][T30429] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.662767][T30431] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.692376][T30442] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.750452][T30453] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.764443][T30455] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.764590][T30446] loop0: detected capacity change from 0 to 264192 [ 289.776369][T30458] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x56b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.813187][T30446] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800c01c, mo2=0006] [ 289.822718][T30446] System zones: 1-2, 19-19, 35-38, 46-46 [ 289.829758][T30446] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/901/file0 supports timestamps until 2038 (0x7fffffff) [ 289.841224][T30462] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:35 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.884324][T30461] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.902387][T30479] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.936421][T30478] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.948482][T30485] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 289.975122][T30492] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58b4ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.991772][T30495] loop0: detected capacity change from 0 to 264192 [ 290.018480][T30499] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 290.031161][T30495] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/902/file0 supports timestamps until 2038 (0x7fffffff) [ 290.047966][T30502] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.106553][T30513] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.141632][T30520] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.178392][T30530] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.196135][T30531] loop0: detected capacity change from 0 to 264192 [ 290.211688][T30527] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.225351][T30531] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/903/file0 supports timestamps until 2038 (0x7fffffff) [ 290.251810][T30545] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.266405][T30550] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.290562][T30549] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.314557][T30552] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.335819][T30559] loop0: detected capacity change from 0 to 264192 [ 290.353603][T30557] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.371989][T30559] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/904/file0 supports timestamps until 2038 (0x7fffffff) 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.393343][T30566] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.435553][T30574] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.464190][T30578] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.497555][T30582] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.516976][T30592] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.533520][T30595] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.543260][T30590] loop0: detected capacity change from 0 to 264192 [ 290.562510][T30597] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 290.600908][T30590] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/905/file0 supports timestamps until 2038 (0x7fffffff) [ 290.635285][T30608] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb401000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.672486][T30611] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.692615][T30616] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.714981][T30621] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.733124][T30624] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe83a1b0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.785719][T30639] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.804108][T30640] loop0: detected capacity change from 0 to 264192 01:01:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xefffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 290.844045][T30649] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.844566][T30640] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/906/file0 supports timestamps until 2038 (0x7fffffff) [ 290.873961][T30656] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.926778][T30655] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 290.939452][T30659] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 290.975711][T30670] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 291.029314][T30678] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.048497][T30681] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0xc, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.096323][T30693] loop0: detected capacity change from 0 to 264192 [ 291.105575][T30683] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.110623][T30693] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 291.126024][T30693] System zones: 1-2, 19-19, 35-38, 46-46 [ 291.131535][T30689] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.132129][T30693] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/907/file0 supports timestamps until 2038 (0x7fffffff) [ 291.161489][T30698] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.211687][T30704] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.256374][T30707] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.274524][T30712] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.289533][T30716] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.311836][T30721] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfc02000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) [ 291.364418][T30728] loop0: detected capacity change from 0 to 264192 [ 291.401477][T30728] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 291.412544][T30736] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.418275][T30728] System zones: 1-2, 19-19, 35-38, 46-46 [ 291.429965][T30728] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/909/file0 supports timestamps until 2038 (0x7fffffff) 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 291.477553][T30734] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.501017][T30740] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 291.519262][T30750] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.530780][T30754] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.549800][T30757] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff07000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.597859][T30766] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.633298][T30773] loop0: detected capacity change from 0 to 264192 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 291.659361][T30774] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.683275][T30782] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.691179][T30773] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.695875][T30784] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.718817][T30773] System zones: 1-2, 19-19, 35-38, 46-46 [ 291.725195][T30773] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/910/file0 supports timestamps until 2038 (0x7fffffff) 01:01:37 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.758211][T30788] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.788354][T30793] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 01:01:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.818881][T30799] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.834121][T30797] loop0: detected capacity change from 0 to 264192 01:01:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) [ 291.873811][T30814] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.906130][T30815] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 291.935448][T30797] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 291.946008][T30817] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 291.958093][T30797] System zones: 1-2, 19-19, 35-38, 46-46 [ 291.970321][T30826] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [], {0x14}}, 0x28}}, 0x0) [ 291.970853][T30797] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/911/file0 supports timestamps until 2038 (0x7fffffff) [ 291.997491][T30831] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.050184][T30838] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 1: creat(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) [ 292.101053][T30836] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.104757][T30843] loop0: detected capacity change from 0 to 264192 [ 292.119249][T30847] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000000c40)={0x2c, r1, 0x701, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}]}, 0x2c}}, 0x0) 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.144486][T30852] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.159192][T30843] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/912/file0 supports timestamps until 2038 (0x7fffffff) [ 292.183974][T30858] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 1: add_key$fscrypt_v1(&(0x7f0000000240), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.204708][T30854] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.230028][T30862] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000a00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000000300)=""/227, 0xe3}, {0x0}], 0x4, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000001600)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.258416][T30866] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.294636][T30874] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.315811][T30878] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0a00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 292.316639][T30881] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.317082][T30883] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.346021][T30884] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.346387][T30885] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.360824][T30895] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.363013][T30897] loop0: detected capacity change from 0 to 264192 [ 292.370362][T30899] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.394065][T30897] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/913/file0 supports timestamps until 2038 (0x7fffffff) [ 292.419324][T30902] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.425138][T30908] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.443720][T30910] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.444327][T30912] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.448648][T30907] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.453199][T30913] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.465657][T30911] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.466322][T30917] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.489420][T30922] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.491764][T30915] loop0: detected capacity change from 0 to 264192 [ 292.505265][T30920] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.674509][T30915] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/914/file0 supports timestamps until 2038 (0x7fffffff) 01:01:38 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000b00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x8ad6, 0x3000000, '\x00', [{}, {0x801}]}) open(0x0, 0x0, 0x1f9) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:01:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.679319][T30923] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.725173][T30927] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.759225][T30934] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.771665][T30939] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.791889][T30944] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.824367][T30927] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.824657][T30956] loop0: detected capacity change from 0 to 264192 [ 292.840559][T30952] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.858475][T30944] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0b00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:39 executing program 1: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffe000/0x1000)=nil], &(0x7f0000000040)=[0xab2], 0x0, 0x0) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 292.875164][T30956] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/915/file0 supports timestamps until 2038 (0x7fffffff) [ 292.913964][T30957] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) [ 292.956780][T30966] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 292.971346][T30974] loop0: detected capacity change from 0 to 264192 [ 292.982437][T30972] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.003660][T30977] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.017345][T30975] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.035619][T30974] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 293.044183][T30974] System zones: 1-2, 19-19, 35-38, 46-46 01:01:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000900)='./file0\x00', 0x101743, 0x0) unlink(&(0x7f0000000640)='./file0\x00') 01:01:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000c00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 293.046849][T30985] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.050942][T30974] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/916/file0 supports timestamps until 2038 (0x7fffffff) [ 293.076850][T30986] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.111942][T30989] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.139282][T30994] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='numa_maps\x00') [ 293.155092][T30999] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.167899][T31003] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.193462][T31007] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000200)={0x0, 0xfffffffffffffd43, &(0x7f0000000100)={0x0, 0xfdd4}}, 0x0) 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.209288][T31013] loop0: detected capacity change from 0 to 264192 [ 293.220105][T31002] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.239413][T31013] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 293.246330][T31012] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.276971][T31010] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.277443][T31013] System zones: 1-2, 19-19, 35-38, 46-46 [ 293.295411][T31022] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.339749][T31026] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.352175][T31031] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.353716][T31013] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/917/file0 supports timestamps until 2038 (0x7fffffff) 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0c00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c262c927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd60da03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 01:01:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.381755][T31034] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.399419][T31038] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.427578][T31039] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.473009][T31042] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.484585][T31047] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.496869][T31049] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.508589][T31055] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.523952][T31056] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.529710][T31063] loop0: detected capacity change from 0 to 264192 [ 293.535827][T31057] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.563923][T31063] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.571877][T31063] System zones: 1-2, 19-19, 35-38, 46-46 [ 293.579365][T31062] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.593831][T31063] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/918/file0 supports timestamps until 2038 (0x7fffffff) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000d00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 293.620410][T31071] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.646212][T31072] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.661940][T31078] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.685885][T31077] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.697996][T31081] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.715441][T31085] loop0: detected capacity change from 0 to 264192 01:01:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.737928][T31085] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 293.750170][T31092] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.763908][T31085] System zones: 1-2, 19-19, 35-38, 46-46 [ 293.772268][T31085] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/919/file0 supports timestamps until 2038 (0x7fffffff) 01:01:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 293.787924][T31097] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.815196][T31098] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.829020][T31103] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 293.840873][T31104] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 1: syz_io_uring_setup(0x260f, &(0x7f0000000700), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) 01:01:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0d00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 1: mlock2(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xe) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x6000) [ 294.324678][T31115] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.354680][T31124] loop0: detected capacity change from 0 to 264192 [ 294.362380][T31123] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.385938][T31127] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.402240][T31126] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.416433][T31124] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/920/file0 supports timestamps until 2038 (0x7fffffff) 01:01:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 1: r0 = syz_io_uring_setup(0x4a75, &(0x7f0000000000)={0x0, 0x5e4b, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000006d000)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000074800)={0xcd, [], 0x2, "e123e6dd988200"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000075800)={0x0, 0x0, "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", "36fa8dc2e6024d98a8c0da1fb93fa9e29720bfbedb8a64456d02a146a44831c6d9d1e382af5e5a7252d520ef8e8c8e9d3cd153f713a75d25a909b40eaae35e57e1f69bda1ef6aa6d4f2b3ea94fa626f9ea22a8b766b9ed25ca3abd75e1263f43ee67addd0d217ca86b22ad1899e5be57e27651d7fdc81956e7640359764332bda25a4dcda2381e12cf291ff3f4ef9922a262dab05a3a406add8b088a78ef49b2a2e779468ed0839d44d865280e7305525d6a07ba8fe2b5a2809a4adc9fed1a0b3a96c965c446b034ac987209d51e6095f9bb4299980f277a40cb8bcaf52f9249fb5419c3d52151b7d09ccad96a205c19dabb2a4d12cd1d757c5220e030f2182f1053b1eca169f0de30004918a7182a5dc4641bc4d9868a72f55e22a13ff63c8eb18adc30101b7c797fda23bfad8fbb8d0eb724069905381597d96fe32402405f0c739e28e8f869c07a85742a1309a52aca58c6f30f1278c26baeac6df3947868c7a634d32ce4f27ae77b9ebbe28eca6cdebd6ceda1c17915b15adf5804d10eb699250a021cafa18703e51fb23b3ddff3d2aa4d94ebbb3556022601c61c859f37125ce6b198cdafbb3a9b49210ec27a1f1289ad23afbcb7b6bdf2f179c97e31178bd0d8de44d04d5f13889472c5a16d4449e7d9b97733e2e1c194bb2649f7cde9b5ea6e77fd567db8187934a4df7134159f3d528a96f430d932bbce91df28565fe3aec24c9828e960da44e05c4aa8af6eb47ffd6fc4cbbeb9f7c15cfb811f17a621cbda3c11dfc8c08ddf42f802789da4ed7d979afe169ec7a6c93d3d8e3ca882a3c45ec40659304ca576f030c75221fb1ea527124f54888de4eb114066efccdb24581bacf65caa218346cd66ac9d770f898664105e9129607c89c143031355a43dc13f1b4cfc34cbead1496ee5926f4b88ec1d1da97ad44a91b8f3ca969995c0ea6e856c8a9629848240cf516d427e8959bb144c6a85f379f6f8112b484e066986bf66ba452c6523d86a0a8b5e87d6138edca8d5a75d2634c317e10ab6f85f109f97b47bf19645b10be187b016e2196f4b909bc8b23ec15a442004ac942823d7fc1884e15a1a9275b198e3dd05e57bb4caeb68522e4eca6afa25217f4964b4e9057de4c1b574006a5269cb3219e2b510616465724b385a088b18aa382894c299f807406cbb50cd6f6370a3a85eeb56823dce11719124cfac9fc6572123e081324fd091c87b3f32b88d2d04b859914c903f3f1df43381cfa080a5e80c5de92b299a65b6752bda0aa93a9f496ed2bfa1645b62c8d9218511cca559b56e7125f27cbe27140515133b4fcf05e307d33bc45f18b161947e035995322faec2e5e5aa46308e8e40315d00dbf595b3f3b912bae427f3ad087cbe41167db8c30f5c6c3e6f3998dfc58448e52a1ae3c91c4895ec31baec2ba03727ed47d70da7a335b51a2ccc3142339662f9fbf68e41126f0f473661a93c339e12d04f67a211ad5c36fc0784a2c9ac237caddef38e97e721b6a8fdd1de365cf59856c2fe0e901529e6cb6bfbcfdc62c9c9f07282c0bd89a95daa61d74b91d761eb29002b310283d1b54b3930001aaa9a7b85a9f07f22a1c9d24e35b14c3f55943af92a7aea2986d870376e5c1a7c2ed3fb425c7fc29eea85fb8e19a63100b58bcaa2b17377ddd7ab7a414528ba26cf3351d2b742968a7cc092211121e639645a9ea11f3ae14549f69f17e8b8335e58f12924dcdc00955b5f5df533cc959eecd15bbd7c64b6d8b6070fb6f8a6660ffa04b18a2ce8c727a8a2ccb7c75b56b6883f599377e30eae5fb6dd55d79f4058b63760ab6f88a75e15e6b43f74e7e17eadb989dbf0f307b98a607678cef6c864815f0335a9ba722d6f35324a8ae32d77700a4ab071f5d4994edf80c64895865a28f23a4962a386bea7f7435617fb96988ea08a243592866c51b2cd34a6795b2decf1f361da980e0f08684d691525995348f865e57fcf11ff6b057ebc54b3960ef5ca94a44c93461c43688e8198d2c18dc8662e04cd7529fbc67f47948720e79dbc06583a052217203cc301fd7f133a2cb7f302fe717e99b7ad5c42c571e2b3aeb5a48d562f4c3f9a9eda43305728d52791d9c0c9a482c40df3458b868f99830acac7dc04f71cad25ab76a973125a6e40307f167d2f869d3598ce954876ee705ccc9c7aa9637cc615819b7a3d6d8801d4d7ba90f6de9f366a44fb91fa6f027522af0ab964d185a6fb739c1b5a9fc2a3d0e13fa11ab3627d828adb73a18323c3f3fcb9f074cb55bff1e1e3ccb28134c1279150e082216f4b29f45d126f23483eca2ef09a861ac3d498dc60fa039650b58eccfec242c97da9bc6b3f6454eeb7ee4676c4a643d80e67f82022ae7c8e32e9f2038d2157a35a245b452933f97c68ae24569157a0868e32b3a4242aa96bd3b2beffa72f596537249af1f20e3b2e7f2de4c63278aceef0a03b8180ab7776be210943ef9db7d11975c5720f12b28c71a503fb8d1b1c496720af93eed3a52cc09a389595698d786ffa85d025b7ee9bcd813d738252cebfc6101af62bf0a66a5c28d4b76a3d99e444c2100c21b263f5a1e659c500df6cd2df3592c9a1f0c5c704a161f30ac836c8885e5d028253130106d19ed592c9cd037b89262456923bfddad94b33564c6758d9031fa7bf38a351c18d775ef2fc4f0ac9cd6010a99c865604c7eb83b8cc8b79217c5ef952d9c9f95eb437eed0346bfc3baa18f19e89ef381c2e5f51c0751839ada7b5d8a1e9f611148c12e53ed783fa2918cb5389804af512013dc5e1b68c330cfb84667259d023c6019eb0f20909f174462d023f5c2360c7d276dd2b18f87b00ef0c41ff3dff2a0dcd17d4d893e94b1835b82d0090ab844dfe6d692991e9927362e72fda825bc6145e563eeecf6eaf8f903748d2223601d6f939317680c34c597dbe7638f062891d0bdd7845c16de623de61ea4f510a8bcac9783385ca83ee97ed28d755287f5f4a0e6c29d00fbf5276ae09d3abf5666e6f46021eec0ff953a0b021f5b99f09296d37a6e8aeffafe31eee85ba22fca62c53966532eee9daef4133125ba1a40c88cc2677f63d1c9e10201cf0fb14ad788b9d2f96768feae8cd7abd35f4653f0d13fb0f2b184135416df89e8898a4536a2bd23b1e62c5c0f9f346530c2965f8a39333dc302e5f67d04f08a5d7e56175ef21d955cd9d7335d2869a30b26c67934ada4e0e483b836ff106e2f9102fef7bcb321400d0a4f52f37446f737be261fa0c13337155ffc0ca1877c426070b5984ee2f78d35dfe6e4735a6d4298229560d50b62fbac06caa226fb3ed94fe3e22b06721aa274ecc16fc92865ce85170fc02de7b31cec4054ea213eb0f468016abfb5540f983a401925e872f4dfb7f2e8b9a9133efadba8470bacfbf63baa74ce66009655242ee102648e3f4a62efba66d85f24713ac5b65115abbba24d4fdb44c676b112a2e1a81be73e5266f7e1f724f28ae7f5c3c0528405ced6357a1e28c87a03de7ed47428165a98d1a71184648d048a52cb94a99115e15cbc2c0a764b5c6eb4fa75b1f60e8fbeae0f2cc669f2abe2a6f4dd610439dd2de320d31b32150f556cc6609ae5f09b19ba99fae97d2b118e68cdfbf27e60f7b7929615c3bc70463acef1f15713636b54cfd2573498d79642aa7b530178350077839a9ec012cc1857a6d1889a697ec84a29e6fa3fad5fe7b22db74eec2fb26600048abbc15155201a8872b7a9e37ee973834864ef6755b9906c1699f4fc293d1010e17c084435151c29c672d28de30043407283d2231df3d48e927702fbb34d1932e06d307194bf87711bd108bdfe12f954953a74cab52dccbc6b5209657ea917dc65bd47852cb68b5961ec55e5af1383ab08e1478969c2b90caaa1f932ff081158dab09f7d269457775f8c31e7d87fa39040df5d3030659d2741bcdd2159e059afb010ebc61b4d837b50d7c6c87d388baacaccb66a88690026ac77635c6a13ef209a13e3730770583125f1bde8aabcf756c70b468642cfd064023fc45a0969d869c05cb4a2eeeef534b810bfdb5f785d9ffd3da9e6d9354d055bc26d2e11b5b76a98069b329c5794755f075bf66f0559744b81e38f8774c0dbbba9dcf9ef8b8b0b0f9ad5502cfdf8735393cfd4d30da07a7e24142ad9a5fa178cc22ed94895274e7f4bd3c605490a469944ebefbd131641a8bef2477164dd6f3428bd5912e834380589a2762564d310cbf38c498e94919ad135754a7dd65fae986cc7fe3cbac07f91449bbc57cfd35f51cec0ea35638650933da049e40ee37bf88a51e848ee2b6f429e1f3874f6dc4e49f49e754d311ebc06a802e2eb1dc87b612498294c730751e044daef22f27cdea570fb9b72c4acb0d7bba847f01bfaab0cbaab4efe9c19a372d17181e2a184cae9b425c2e9b817e78686c6a75ed185fa122914f9b87d6b7e73087fcef63ea20375f6b85db93b6041558183b6541ac062614175bcee2697ff8a1f3e53d5b233c2dd12cd4055445b6d523423acf67f9873d6651c04d55a813b193e46d033314ccba0272b9d9192cf1e48bee933adc766b1957564ae45bd2790fd7a0057678bed4026de1c3c32966b7c9cf4f0f82fc5d0f9aac0ffb586aeb57306d989aa5f8a0016116afaab0e8ffb33037367a9b02c5e65d664ba74275e9676bdc3af34f96b800f5cf148500b3232b099b758c46631b337a0436a0d2e551d84795e3d2f9976673a57c71a473cc01e003327de44a1ec0f17809ea3faa3841d77716728ceec47835a373ea273ce922c6a82d001b1f77fd8d687c6d57fa34357d7f8725ce1e4d24ce6c1e8e182223428263b3972f837f6654e8ad9431261985c0a6538f48b26ac4be6642f2a2069d57d6efad0958123a62635f2917cc6aa3dae1bca16e7129bfbb4408486306b7d22ea7e78b32520058036989e0d454d43590d6714d3f1759b323cb5c8e17bd3b39f317312e0f987cc2867a8f9f3d7fbb7cd917b1772552df62839349d7a95d2b3271923972af4534049a19cd84044434025ce7a8ed7396ce2ba72e7bac24477973d904f25b01b20a9d6dab4380a5a5b383f7a484a3c3d8e3949428f3b3c9ce8a1bfffeec9ee98ab05e914ffa71fc547020d4fbf44dee42604754b50d64188e95e39d4b0b511b10cdddfc37bd49916eb61e9f16ef8920876a8c3ce12cb263c12a0c1ff6e8ffb5547ffbd4dbe0b6a023df52986087b1618a5faa4d51abf7664b5e71e5923c60d80e497215748a10f6e28bc8388f0307c628832b8710ffa2864568ec21524a290be35e421e5c669997fe8e8d8916d86f8722b5eb793ac8f466afe78b39a52e8a89a45905b94ae074e9e59fa5b9ebb825144df4a0feb34bbb7442d40033af3af3b1f4b9d8e9c1f99a97f6b2d44622261edfb37949d1541b3f"}) syz_io_uring_setup(0x847, &(0x7f0000000080)={0x0, 0x0, 0x22, 0x0, 0xbe, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 01:01:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.441555][T31135] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.458683][T31140] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0e00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.494762][T31146] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) [ 294.545245][T31158] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.587552][T31150] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.592171][T31169] loop0: detected capacity change from 0 to 264192 [ 294.608697][T31165] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x18, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) [ 294.639575][T31175] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.654506][T31169] EXT4-fs mount: 35 callbacks suppressed [ 294.654521][T31169] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 294.668019][T31179] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.687153][T31180] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.691656][T31169] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/921/file0 supports timestamps until 2038 (0x7fffffff) 01:01:40 executing program 1: r0 = socket(0x18, 0x0, 0x1) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 01:01:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.731675][T31189] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.771044][T31192] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:40 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000f00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 1: getgroups(0x7, &(0x7f0000000100)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) 01:01:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:40 executing program 1: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 294.812508][T31198] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.834364][T31204] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.858835][T31207] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.871269][T31214] loop0: detected capacity change from 0 to 264192 [ 294.878728][T31206] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 1: socketpair(0x18, 0x0, 0x0, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.906828][T31216] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 294.919448][T31214] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 1: shmget(0x1, 0xc000, 0x0, &(0x7f0000ff4000/0xc000)=nil) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 294.989802][T31214] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/922/file0 supports timestamps until 2038 (0x7fffffff) [ 295.003286][T31234] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a0f00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001180)=[{{&(0x7f0000000000)=@in={0x2, 0x4e24, @local}, 0x80, 0x0}}], 0x1, 0x0) [ 295.040290][T31232] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.062309][T31242] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.080290][T31241] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.093063][T31246] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.116569][T31250] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000004a4301"], 0x1c}}, 0x0) [ 295.160862][T31258] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.182784][T31263] loop0: detected capacity change from 0 to 264192 [ 295.191726][T31263] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 295.201470][T31263] System zones: 1-2, 19-19, 35-38, 46-46 [ 295.205577][T31264] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.208539][T31263] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 295.229496][T31263] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/923/file0 supports timestamps until 2038 (0x7fffffff) [ 295.232260][T31271] selinux_netlink_send: 21 callbacks suppressed 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 295.232274][T31271] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=17226 sclass=netlink_xfrm_socket pid=31271 comm=syz-executor.1 [ 295.282699][T31270] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.295521][T31273] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000001100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.322763][T31281] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x10, 0x1}], 0x10}, 0x1) [ 295.376429][T31289] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.392485][T31291] loop0: detected capacity change from 0 to 264192 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.421574][T31288] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.427390][T31291] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 295.444631][T31293] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.454455][T31291] System zones: 1-2, 19-19, 35-38, 46-46 01:01:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.482604][T31291] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 295.493476][T31306] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.508333][T31291] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/925/file0 supports timestamps until 2038 (0x7fffffff) 01:01:41 executing program 1: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 01:01:41 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 295.516032][T31310] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 1: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.562348][T31315] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 01:01:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.620803][T31328] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.639059][T31332] loop0: detected capacity change from 0 to 264192 [ 295.655623][T31333] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:41 executing program 1: accept$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0) 01:01:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.693403][T31338] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.712560][T31342] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.724738][T31332] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] 01:01:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:41 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001440)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 295.738800][T31351] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.743848][T31332] System zones: 1-2, 19-19, 35-38, 46-46 [ 295.771635][T31355] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.806756][T31358] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.817460][T31332] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 295.822771][T31362] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.845800][T31365] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 295.849885][T31332] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/926/file0 supports timestamps until 2038 (0x7fffffff) [ 295.859623][T31363] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000200)) 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 295.907525][T31368] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000240)={0x0, 0x0}) [ 295.959538][T31382] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.000262][T31392] loop0: detected capacity change from 0 to 264192 [ 296.008540][T31378] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.032720][T31392] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r6, 0x221, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x2c}}, 0x0) sendfile(r3, r2, 0x0, 0x10000000a) 01:01:42 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000001300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 296.050227][T31392] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/927/file0 supports timestamps until 2038 (0x7fffffff) [ 296.051956][T31386] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.099064][T31398] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.118458][T31402] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.155534][T31409] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.166607][T31416] loop0: detected capacity change from 0 to 264192 [ 296.175336][T31417] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.205575][T31416] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.247543][T31429] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.250932][T31416] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/928/file0 supports timestamps until 2038 (0x7fffffff) 01:01:42 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.303582][T31430] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.336397][T31433] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.348293][T31441] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.391669][T31442] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.397807][T31453] loop0: detected capacity change from 0 to 264192 [ 296.410115][T31444] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.430693][T31454] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.460153][T31457] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.472034][T31453] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 296.490726][T31453] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/929/file0 supports timestamps until 2038 (0x7fffffff) 01:01:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) recvmmsg(r0, &(0x7f0000001680)=[{{&(0x7f0000000000)=@nl=@proc, 0x0, &(0x7f0000001440)=[{&(0x7f0000000080)=""/10}, {&(0x7f00000000c0)=""/168}, {&(0x7f0000000180)=""/42}, {&(0x7f00000001c0)=""/204}, {&(0x7f00000002c0)=""/159}, {&(0x7f0000000380)=""/190}, {&(0x7f0000000440)=""/4096}], 0x300}}, {{&(0x7f00000014c0)=@in={0x2, 0x0, @dev}, 0x0, &(0x7f0000001640)=[{&(0x7f0000001540)=""/103}, {&(0x7f00000015c0)=""/98}]}}], 0x3, 0x0, 0x0) 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000001400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 296.503589][T31465] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.561456][T31472] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.591286][T31474] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.608545][T31484] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.620721][T31487] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.632856][T31489] loop0: detected capacity change from 0 to 264192 01:01:42 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.653208][T31488] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.675672][T31494] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 296.702067][T31489] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 296.716826][T31504] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.725637][T31489] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/930/file0 supports timestamps until 2038 (0x7fffffff) [ 296.752218][T31503] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.765023][T31509] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.782956][T31510] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.815839][T31511] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 296.827728][T31516] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000180)='S', 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 01:01:43 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.404942][T31523] loop0: detected capacity change from 0 to 264192 [ 297.427527][T31528] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.447246][T31534] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.458958][T31523] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 297.474368][T31523] System zones: 1-2, 19-19, 35-38, 46-46 [ 297.502703][T31535] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.521085][T31523] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 297.540543][T31536] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000180)='S', 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 01:01:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 297.555708][T31523] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/931/file0 supports timestamps until 2038 (0x7fffffff) [ 297.579030][T31542] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.624632][T31551] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.659256][T31556] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.674329][T31560] loop0: detected capacity change from 0 to 264192 [ 297.713467][T31567] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.727486][T31570] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.727989][T31560] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e01c, mo2=0006] [ 297.759798][T31565] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:43 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.799532][T31560] System zones: 1-2 [ 297.799535][T31576] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.814077][T31581] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.814466][T31560] , 19-19, 35-38, 46-46 [ 297.830315][T31560] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.849226][T31579] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.849683][T31560] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/932/file0 supports timestamps until 2038 (0x7fffffff) [ 297.878354][T31584] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000180)='S', 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.901783][T31590] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 297.930874][T31592] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 297.985189][T31594] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.021511][T31612] loop0: detected capacity change from 0 to 264192 01:01:44 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.023178][T31613] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.049142][T31606] ================================================================== [ 298.057350][T31606] BUG: KCSAN: data-race in mb_free_blocks / mb_update_avg_fragment_size [ 298.066039][T31606] [ 298.068380][T31606] write to 0xffff888102c2cb58 of 4 bytes by task 1808 on cpu 1: [ 298.076112][T31606] mb_free_blocks+0x323/0xb40 [ 298.080819][T31606] ext4_free_blocks+0x1418/0x1b50 [ 298.085866][T31606] ext4_remove_blocks+0x61a/0x800 [ 298.090916][T31606] ext4_ext_rm_leaf+0x670/0xd20 [ 298.095881][T31606] ext4_ext_remove_space+0x901/0x1300 [ 298.101281][T31606] ext4_ext_truncate+0xfe/0x170 [ 298.106149][T31606] ext4_truncate+0x76e/0xa80 [ 298.110752][T31606] ext4_evict_inode+0xa54/0xdb0 [ 298.115638][T31606] evict+0x1c8/0x3c0 [ 298.119565][T31606] iput+0x430/0x580 [ 298.123383][T31606] dentry_unlink_inode+0x23a/0x260 [ 298.128507][T31606] d_delete+0x78/0xe0 [ 298.132523][T31606] vfs_rmdir+0x2a6/0x2c0 [ 298.136959][T31606] do_rmdir+0x14a/0x2e0 [ 298.141166][T31606] __x64_sys_rmdir+0x2c/0x30 [ 298.146135][T31606] do_syscall_64+0x3d/0x90 [ 298.150562][T31606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.156644][T31606] [ 298.158986][T31606] read to 0xffff888102c2cb58 of 4 bytes by task 31606 on cpu 0: [ 298.166715][T31606] mb_update_avg_fragment_size+0x161/0x260 [ 298.172534][T31606] mb_mark_used+0xae0/0xc50 [ 298.177062][T31606] ext4_mb_use_best_found+0x102/0x320 [ 298.182461][T31606] ext4_mb_find_by_goal+0x5c3/0x890 [ 298.187672][T31606] ext4_mb_regular_allocator+0x11c/0x2520 [ 298.193519][T31606] ext4_mb_new_blocks+0x762/0x1f90 [ 298.198751][T31606] ext4_ext_map_blocks+0x1569/0x1f00 [ 298.204143][T31606] ext4_map_blocks+0x70d/0xef0 [ 298.208945][T31606] ext4_alloc_file_blocks+0x271/0x720 [ 298.214356][T31606] ext4_fallocate+0x2a7/0x4d0 [ 298.219161][T31606] vfs_fallocate+0x463/0x660 [ 298.223768][T31606] do_vfs_ioctl+0x1322/0x1410 [ 298.228464][T31606] __se_sys_ioctl+0x83/0x140 [ 298.233056][T31606] __x64_sys_ioctl+0x3f/0x50 [ 298.237642][T31606] do_syscall_64+0x3d/0x90 [ 298.242076][T31606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.248000][T31606] [ 298.250356][T31606] value changed: 0x00000001 -> 0x00000002 [ 298.256194][T31606] [ 298.258541][T31606] Reported by Kernel Concurrency Sanitizer on: [ 298.264686][T31606] CPU: 0 PID: 31606 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 298.275343][T31606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x304}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:44 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 298.285512][T31606] ================================================================== [ 298.297803][T31612] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 298.309086][T31612] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/933/file0 supports timestamps until 2038 (0x7fffffff) [ 298.324942][T31615] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.370191][T31621] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x339}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.414893][T31632] loop0: detected capacity change from 0 to 264192 [ 298.421515][T31622] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.435556][T31636] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000180)='S', 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 01:01:44 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.468886][T31637] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.482051][T31640] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.494947][T31632] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.537299][T31632] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/934/file0 supports timestamps until 2038 (0x7fffffff) [ 298.549202][T31650] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:44 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 298.621073][T31659] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.657021][T31661] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.677223][T31653] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.701058][T31669] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0xee97b7c4acb227bf, 0x0) 01:01:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.721592][T31670] loop0: detected capacity change from 0 to 264192 [ 298.727446][T31663] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.756852][T31675] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000005c0)={&(0x7f0000000080)={0xa, 0x4e1d, 0x0, @mcast2}, 0x1c, &(0x7f0000000540)=[{&(0x7f00000000c0)="c9", 0x1}], 0x1}, 0x0) 01:01:44 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.786962][T31670] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 298.820086][T31670] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/936/file0 supports timestamps until 2038 (0x7fffffff) 01:01:44 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1a00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 298.840686][T31687] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:44 executing program 1: io_uring_setup(0x0, &(0x7f00000001c0)) 01:01:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.889104][T31692] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.900746][T31699] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 298.929313][T31706] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.948306][T31709] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 298.965684][T31711] loop0: detected capacity change from 0 to 264192 01:01:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/asound/seq/timer\x00', 0x0, 0x0) [ 298.997992][T31716] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.014904][T31711] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 299.024572][T31711] System zones: 1-2, 19-19, 35-38, 46-46 [ 299.030957][T31711] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 01:01:45 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 1: socketpair(0xa, 0x0, 0x0, &(0x7f0000000240)) 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.062285][T31725] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.072900][T31711] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/937/file0 supports timestamps until 2038 (0x7fffffff) 01:01:45 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004a1b00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.112803][T31730] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.126681][T31734] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.153410][T31740] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 1: r0 = gettid() capget(&(0x7f0000000040)={0x19980330, r0}, &(0x7f0000000080)) 01:01:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.199829][T31746] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.216030][T31749] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.226178][T31755] loop0: detected capacity change from 0 to 264192 01:01:45 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.253063][T31759] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.270107][T31755] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 299.285433][T31771] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.303756][T31773] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.308083][T31755] System zones: 1-2, 19-19, 35-38, 46-46 01:01:45 executing program 1: syz_genetlink_get_family_id$mptcp(&(0x7f0000000380), 0xffffffffffffffff) [ 299.343872][T31772] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.355538][T31755] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 299.363475][T31779] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.380214][T31755] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/938/file0 supports timestamps until 2038 (0x7fffffff) 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.388641][T31778] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.416480][T31784] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:45 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000002000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:45 executing program 1: r0 = gettid() process_vm_writev(r0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000080)=""/124, 0x7c}, {&(0x7f00000002c0)=""/168, 0xa8}], 0x3, &(0x7f00000019c0)=[{&(0x7f0000000440)=""/246, 0xf6}, {&(0x7f0000000540)=""/237, 0xed}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.460593][T31789] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.491274][T31794] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 1: syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) [ 299.523398][T31804] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, 0x0) 01:01:45 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.570568][T31813] loop0: detected capacity change from 0 to 264192 [ 299.580893][T31810] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.609578][T31817] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 1: socket(0xa, 0x3, 0x4) [ 299.652432][T31824] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.664215][T31813] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e800e018, mo2=0006] [ 299.683193][T31813] System zones: 1-2, 19-19, 35-38, 46-46 01:01:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000002300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:45 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x105000) [ 299.697414][T31832] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.712117][T31813] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 299.723703][T31813] ext4 filesystem being mounted at /root/syzkaller-testdir267330772/syzkaller.LcurhR/939/file0 supports timestamps until 2038 (0x7fffffff) [ 299.740421][T31834] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.771862][T31841] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.812770][T31846] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.850188][T31853] loop0: detected capacity change from 0 to 264192 01:01:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000440)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1, 0x5}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@hoplimit={{0x14}}], 0x18}, 0x0) 01:01:45 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.862281][T31855] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.896675][T31862] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r5, @ANYBLOB="08000600", @ANYRES32], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 01:01:46 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000002500000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 299.909101][T31853] EXT4-fs (loop0): inodes count not valid: 32 vs 64 [ 299.920906][T31868] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 299.949146][T31870] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a03}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 299.999210][T31880] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.032978][T31885] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3903}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 300.054432][T31888] loop0: detected capacity change from 0 to 264192 [ 300.069577][T31891] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.084436][T31888] EXT4-fs (loop0): inodes count not valid: 32 vs 64 [ 300.091673][T31898] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000002600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 300.129357][T31902] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.156765][T31904] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 300.185474][T31909] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.216175][T31915] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/timer_list\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) [ 300.243836][T31908] loop0: detected capacity change from 0 to 264192 [ 300.251928][T31918] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.273993][T31908] EXT4-fs (loop0): inodes count not valid: 32 vs 64 01:01:46 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000002e00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 300.293932][T31919] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.316438][T31926] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 1: syz_open_dev$vcsn(&(0x7f0000000880), 0xef26, 0x1) [ 300.337150][T31930] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 1: syz_io_uring_setup(0x5b1a, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x3da}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, 0x0, 0x0) [ 300.376496][T31934] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.401870][T31945] loop0: detected capacity change from 0 to 264192 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 300.424301][T31942] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.437707][T31945] EXT4-fs (loop0): inodes count not valid: 32 vs 64 01:01:46 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000003f00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000800), 0xffffffffffffffff) [ 300.466280][T31949] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.513455][T31955] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.548275][T31960] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 1: syz_io_uring_setup(0x5b1a, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x3da}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000007c0), &(0x7f0000000800)) [ 300.552221][T31971] loop0: detected capacity change from 0 to 264192 01:01:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 1: socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)) 01:01:46 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000004700000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 300.584134][T31971] EXT4-fs (loop0): inodes count not valid: 32 vs 64 [ 300.599236][T31963] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.617235][T31980] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 1: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000006980), 0x0, 0x0) [ 300.665503][T31988] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.687869][T31991] loop0: detected capacity change from 0 to 264192 [ 300.699139][T31991] EXT4-fs (loop0): inodes count not valid: 32 vs 96 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 300.729995][T31998] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.742806][T32001] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.758001][T32006] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:46 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000004800000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:46 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 300.775889][T32007] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.796994][T32012] loop0: detected capacity change from 0 to 264192 [ 300.799404][T32010] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.813388][T32012] EXT4-fs (loop0): inodes count not valid: 32 vs 96 01:01:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:46 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000004900000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) lseek(r1, 0x10000, 0x0) [ 300.844881][T32017] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.875358][T32023] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 300.902029][T32026] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.928283][T32033] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x0, r2}) 01:01:47 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 300.957018][T32037] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 300.988102][T32045] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 301.010252][T32046] loop0: detected capacity change from 0 to 264192 [ 301.027529][T32048] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) [ 301.057559][T32046] EXT4-fs (loop0): inodes count not valid: 32 vs 96 [ 301.075862][T32057] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000004a00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 301.110188][T32064] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.134405][T32067] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xefff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x77b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xfffffffc}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ee7000/0x4000)=nil, &(0x7f00000014c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000180)=0x307c, 0x0, 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) [ 301.160572][T32071] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.170967][T32081] loop0: detected capacity change from 0 to 264192 [ 301.193442][T32078] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000004b00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 301.207513][T32081] EXT4-fs (loop0): inodes count not valid: 32 vs 96 01:01:47 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 301.247943][T32090] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 301.293868][T32095] loop0: detected capacity change from 0 to 264192 [ 301.329913][T32099] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000004c00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 301.341723][T32095] EXT4-fs (loop0): inodes count not valid: 32 vs 96 01:01:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000040)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NODE={0xe50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "0c83460617e1d2dc70494cd1e55a381d63131dcb44"}}, @TIPC_NLA_NODE_ID={0xdf5, 0x3, "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"}]}]}, 0xec4}}, 0x0) [ 301.375264][T32103] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.387847][T32107] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.411102][T32114] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000033) [ 301.422909][T32112] loop0: detected capacity change from 0 to 264192 [ 301.425655][T32116] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.447892][T32112] EXT4-fs (loop0): inodes count not valid: 32 vs 96 01:01:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000006400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 301.497914][T32127] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 301.542122][T32135] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.575507][T32136] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.589678][T32144] loop0: detected capacity change from 0 to 264192 [ 301.595797][T32137] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.616166][T32144] EXT4-fs (loop0): inodes count not valid: 32 vs 128 01:01:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038600000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 301.632072][T32145] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.661571][T32151] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 1: syz_io_uring_setup(0x5b1a, &(0x7f0000000740)={0x0, 0x0, 0x20}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000007c0), &(0x7f0000000800)) [ 301.717484][T32153] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.744816][T32164] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 301.757027][T32165] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.777494][T32167] loop0: detected capacity change from 0 to 264192 [ 301.784925][T32170] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 01:01:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 301.818686][T32167] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 301.839071][T32175] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:47 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:47 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038c00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000440)={&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x0, 0x0, [@mcast2]}}}], 0x28}, 0x0) [ 301.879921][T32188] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.904108][T32186] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 301.919995][T32190] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.934680][T32196] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 1: syz_io_uring_setup(0x5b1a, &(0x7f0000000740), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000007c0), &(0x7f0000000800)) [ 301.970173][T32199] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 301.990849][T32202] loop0: detected capacity change from 0 to 264192 [ 302.017765][T32202] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:01:48 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.024828][T32211] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 01:01:48 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038d00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.082033][T32219] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.114064][T32221] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.146948][T32226] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.173961][T32235] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.177511][T32237] loop0: detected capacity change from 0 to 264192 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000040)={0x20, r2, 0x76c7556a1e7e4727, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 01:01:48 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) [ 302.197370][T32238] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.223248][T32237] EXT4-fs (loop0): inodes count not valid: 32 vs 160 [ 302.234887][T32239] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038e00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000040)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x77}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NODE={0xe50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x3e, 0x4, {'gcm(aes)\x00', 0x16, "0c83460617e1d2dc70494cd1e55a381d63131dcb447c"}}, @TIPC_NLA_NODE_ID={0xdf8, 0x3, "52496b772d6ed9934e43f2aa2e279bf323930242ae9e55d66bf87d8dacf262ac98e34452060b51e1f2c25f3c4203d0f810ac749b4c39e2c5592e5225846f9e44e5e40ffab4fd107877ba790f3a676ea321bde0364feba0343c9b4c066de22819a28223028ab5cd1554f74940029eb298808b339a0ae037443f5c66bcda54e9c4da2323fcb5a8956e8db68736200c8c59daab43ef38aada16584ccda172cc1a8fb0ae08ae5564987e88e76cf5f4059ea4444ff6514552a23ab0f961282b310d8e866693fdef5183c892b245753bdbe8f3212282777f0b594c76e65d5f9a0f40ec76966675cd4ef5243f7db8ddd6d0839c45a0bb1c890512eb1dd3b8ac4fb18dc486cca05cd8c603af25d445d4ce7b62a831203a96b490e3d5d9be57ebbcac1894aae347cad192dd727c0553530c2de55677c979251402b1a1ce7abd9798b0f12051ef8cdc301a6a899a521c89c4104dc84503c8d6a35b54b865ffb0d42a572712c737befb0d4cbae56d611a22dcaa81996348322711e67dea757e378f6223a458a7a999464201b9263d1b1da3ed8ec21bbe32346f26a75b696a16d933f9e03f58b25a80e3f17fa0daf9cf857d343c4badccb36d293ebe5341ea1e43f2c42f89dec92d993109c5aa0baeb7b5517a4fc88d0604e926be7a94be5388c70d920ac7e54eec797c384695eb1b67f7e5350bce47c249656a1d8d7d2fd9e6c218659baa229ce134c0d159ec5ac6657d94deeba6191ef4f3c224cb6af4d1764bccf9375371305a1ed43458c3d49ac7973ddcdce9158a4ae0f509a8aaa9d8eccb9885cacc8169108485a85b09c982a0572ee0e482d77b8a0defef4de6ae06859320f7d951a012b17bf5457deea2fc57a9defcc54a4aa6ca7a6d9a622225deebefc6153e571a7da79a383262c770acd4bb7a92331bb5041c45e58024c612558f41a1138cd3a7ffce2ce96d3720d323e425149b678461169391d0cf91b4dc7545d5f3605c55ee2ff0b5f7de0cd4a738335f459077c80a6afcc7a412410ae967157490a66414a2b029019ecf54e92274dbbee8191e63a19092dcb126125dee37e90869b14f9a7ff5cbf7bacfb50c051745dbb71e043fef729332791273939d53288da8c6ec7a2c7fb2f1e314a794fca717eb86a7e22b7594b2d19edf8da53abaf727324d1dc95facf1bfad44ffcdea2690c9a26808671222242d0e8bbb46279c3a4da7df6ea809a31be6e5b6f3fd0b824b59619c5a8282c04c472f862852c7615343668b1459f52eed954bff77d49f2a313efbf4fb95cee3f6cdaf3be40395eb6a6b532b83536da591f87500eaad6064711906b2615518abc8a4cf44c1ef85d2d3b94f6bc27a4c99d58f9e1d8976223d9067b29de1f5b8366217c6de5cf7492670c2c26935d070b303430aa5cb68480485b8611e687fd2d5e59927462abd54384e0eb7c9597716fc1175cd31c7ed57bdbc663da5fdfd673262f5367922f7f6245a37a0e7a7e3081c0bc53c3fbc7e4255087908f88f79803068d9b05da865e7846e257e906fc87a610e2e0ae47479c1a1b2dc5c3d1c648ba8115bdd3bc12ea6d0e8a92f3d132b04f356e5fe6777150d8d19cf2b938587c7fd96de0bb120e8cf81ce175399efccb2dcde207c8849fdec8ff8911f42742ae43f0ee39ef4aa21ad8bf6cac4c6c07cffdf687c760a45ae863642984c38ad5acef7b280e8c3e699b3e5f89111df040167c926bee94c3263ecdd7cb1b515b60c21171343290040ae540d2d577df1f4fb7360d19b4a28a5cca31ee2ea54f584ebd48df8e8c32e6cdebdd74527cbeef2107fa101ce065e66fee1395e62a91f4eba8eaa8de2445fe5a3639c93afc699fbeb2d58e75ad3434dca302a84a0c817afb14d04e4b0d77e4aa5e657c998206d0c322aa93207a80447cadac243573f9cf411580c3ebf551c4263b0aaaa1c8eacd89b5957a0cc2a9347c645ecab9fc8337c029d9726cff772fa1568361bc295180db20679ee7af2b2451c8fe66d54bf35c4646065ae7c000a2e84b7e4b62adf3d0bd3d6d5ffbc279ec194473e549833cd2dd39e230c760831516c4ac083ea78bae0b6feeade9736dcc0f21cff3f592e6c6286c1b3115644129ffac44020e23dca6eac3a0fac5f42a1d5dfd8864c284b7886c3df692d80d62f2c3bb70e8a3616d849f29065866de9aedccd432ef14bd92c430bbb4745d012c84eecd0b5f3aece6c9a9a5464392bffcdd607e1f304454da88fb3228f6fad38303a97f1a0ed4609fee720655047ee55a2e692aa6b0f2bb788ecdf070f43594ed2c29c0328d1fb2098140a0d6a810cf11d0a99206d11e7c18ba940cdbb4cd7454d8a3deba0234c876f17841ea95c620fb4f03d6a71af23ba24918de36f529fd89a182ca1fe0cebe52ffe3ec66e94b8617483ef256ac11368fba1977be831dcf7e8cc686530e883d646f831c6f4090add7f475efa6490af7dfe42a8b495c8e94856c48f74ea1792f31e381463a0d48ede8d0f8c89bdd14025b1f453ec49f24b53ecc2826acf5010ee0bf485a248e6a48a1cddb272faa7d66ec33318e942e66e30d04790b23bc0022bdd2eabd5e2052f1c452c3ac94c67a9c38578bbb167a7622c3f7c2b150e4a813741a40214f32abad6ddfddeb5d48b423c8eeabcad5d390b1cc281a369f093db19aa986c8008de4ab7b4d0a3d5618b7b1a6f53a2b49a4cc56bd7c06d36b41dd881bd77d698b5151f1a9318ba686f40ec6336216489035933e0595ad794330ad090c756bb371577fba31f65f2efe4554b88d940564b052ee9d5a3d8339ad0864fc04196fbee1bb55c703eaf125411d0b0b7534995c9ecc4017cd895b094152625c78bb14921a20fba9c8d735376e13fd7c7b783987a121dd4980d11c77040e7b17d3084cb29ec051ae915810ac0be6883dd1cde93a9aebeeed6db892873f6e41f914f7a3103c8da1c4af1c26490f295ee6f8d64ef5fe6384941bc40f07aea2fa4743231b3ca5dc7e904011e54b1613795f9be04846c427301e90219b5ed3f0aa11a86807b2233cb22b9f98fc4d25b3b6c085db554b3c6d9f11206a1a158c90f5ae7b509a706eec64b9342dfa2613afa6a811071996608634d50552a0a5b55b64aeb4b5786b4d1f1afd6c6eb0443a45ec2597da65ecb7b6fc5cd66bb681bc1df76e49ce44ec1cc111f06e03df8a1acb748db6a8164b73af3faa9fa7c9ab3785d5720ced8683e254fd4b56d15ff214439e14a591995b87442e755b5ba145182cc2406c6f649070ecb7e491bfc3731325450ac1fc800b45ac9fd02b57ee63aa9423ecad54ea588b3b99c6e1d3a838c03a6621ed3f72ec6ccb123730f80374ea784880da7a2c890337517d75148caae4c2a545568851efdbda91bd6c6848924027126a1ee43a6cc52e6fe1dc7b58caf941679654e9f6abe09a2fbf3008942ff935e674a36098a36b9f5f5363e406beec072d2df6070bb0fae51f38b0f6df4b1abbb31ab2513858c90c3392b4d34e0dee797f3d8d50804e4eedc0d71576a55f4d680786cf2ea2766a9c5277a9e0a91c9a63cfae5373f99e90d927df6c74d73adbe85380553401a19cd5a0d8dc2b4e509f365c08e4233616b9759302d1045aa332c14c9a9a11451aa2f6fe607baa8aaf9a7cd55fe471c414f35f8a122214f9707b8821591431bb71c69b6393cb2c8d2f80b59fa92136a17924db4367403cdcf98b3296eeecf1c19d1d6874eb1e762f7188d7f4c4090401cdbad080d24e918b80b96fda885da34ae0a03d7923158d045488c864f428082ed558b41bcdaa6ef288394b3a7c8df80a2329826ededb66519349582cdf4ae2668716e0337b2772fbb551d64e60511143b19d79755f5a9641e55e841b5efb0aa7fc70091ad3c4502211fe988b27959512a38af119507001c3cb0304388d621469ded3f9ad82d1b40635ad90024afefdf4687b05926bfd66aaeada728064976eca7237c1aab63b8cc0f3abf3e500ce5c9e8325c4630f71815884e92ee6e474fffe0cc1af53d4cc222c36bd81eb1f1e296de0e6155fe81601af043bf005d7f13a7d2f10f636033b84d7b4b556279c86a7ca93de2216aa38a03ef14d29573c70764d58d13bddc046cfbb479e5b2861237da472ba62c522821214aeb5fe6a9c84edbe808d300da48af3e0bee8acb502491260aa00e27afda152a7c2c29f7d27bc00d476ee4bc99fc6eedb3c1b81d8f749777b79ce686db88fa41dd078072ba4f8a2f11f8c2f26e1c79328820c70ee2a4335776d2aeffaf74f2d2b2b53662ee0118c30f34dbab049690431cd00e978dbfdfac7c57e235d1176e862e23cdace08420abeff4d9a3e4352cca1b5a69d9d42c5cfc7937e6b646f89898aaf7d2b3162614eaadd60f6ab887616e0a5fcf0a5b603177668992416fdc5754ec6aa8d304e9317c7feca1df4cc6ced3c7aec9f806b0c02ec19f4c1df122e89e566fb016f1bcfbcbe74096124e7ae934361b299b3e15dc590f05fcf9c496ac16f45c473bb1ce2f79297d23474f7377b829026d7478ede405f851bf0c3c8c1082361648845d648fa8b85855459cb3a7e4c32f5598e5a198d9df1df5326d805f65064140045e1fb4b45264a5f3aac4a0b34d730529f89584383914cf5423c6ecbf7a15a61651632621ac02136bd955631b554669dd2bce81bbf5a75ac898bafbaa77b152db8c3ce5481deb5a19e7494629dc4c87b4b1f1985cc4c68c2e988e9a4b20049b1fc885d7dbc47ac893f38cfbb9b89480852c6f773f235de8a471b9a49e1e3aa257e17da6cf64a5246b6e8a1cbaafc56bcc83f3c978032f45c79e22317d816fd7cf427d9d67513dbaf781aaeef8d816ad0022d785e3fe4387c70a678f7183c80a97e38d14bd2629fa3a4687b97082cd7af82c93640d878bd322c9af8e67fce803cbf48b94b7f707b51f3ff5d98ccd8c78c14dc7e038e69b7abfe926b796f895c4c960ec066d66f2dbd236d97c14dfecf4c61695f9fcdff991f71bcbe5ea9ead5aaff246706d410c15aa9cd305f8ad05e0f73be28931c2bb29c345ee80df477e3d3c59ebdbc82ad964f3c507"}]}]}, 0xec4}}, 0x20000000) [ 302.283334][T32257] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.335326][T32268] loop0: detected capacity change from 0 to 264192 [ 302.341912][T32259] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.360859][T32266] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.366428][T32268] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:01:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000200)={'wpan3\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000a40)={'wpan3\x00'}) [ 302.384094][T32272] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.403862][T32277] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000038f00000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.448989][T32284] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.495930][T32292] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.508385][T32298] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.528357][T32299] loop0: detected capacity change from 0 to 264192 01:01:48 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000240), &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) [ 302.546506][T32303] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.549898][T32299] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:01:48 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039000000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.607238][T32308] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.625950][T32321] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_256={{0x303}, "35a911aae0945d0f", "016029df351f431b5f211e9c74045a78a80373d289ea7aa1d7ae17b22fbfacec", "2c3a45f6", "57102652fa23755a"}, 0x38) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 01:01:48 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.653172][T32322] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.685262][T32334] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.703166][T32333] loop0: detected capacity change from 0 to 264192 [ 302.715446][T32333] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:01:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.774032][T32342] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.788902][T32352] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.818233][T32347] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.835970][T32361] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:49 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.873948][T32363] loop0: detected capacity change from 0 to 264192 [ 302.888621][T32365] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.914603][T32363] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:01:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.926139][T32371] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.940544][T32380] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 302.966552][T32382] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000005c0)={&(0x7f0000000080)={0xa, 0x4e1d, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) 01:01:49 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039200000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:49 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:49 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'batadv0\x00'}) 01:01:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 303.691501][T32405] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 303.691695][T32403] loop0: detected capacity change from 0 to 264192 [ 303.704350][T32409] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 303.724037][T32403] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:01:49 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:49 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039300000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffffef}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:49 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 303.775250][T32406] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x13, 0x0, 0x0) 01:01:49 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 303.832521][T32427] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 303.869462][T32439] loop0: detected capacity change from 0 to 264192 01:01:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:50 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 303.884074][T32434] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 303.912763][T32439] EXT4-fs (loop0): inodes count not valid: 32 vs 160 01:01:50 executing program 1: getrlimit(0x0, &(0x7f0000000240)) 01:01:50 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 303.928690][T32448] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 [ 303.954844][T32450] ref_ctr_offset mismatch. inode: 0x361d offset: 0x0 ref_ctr_offset(old): 0x6 ref_ctr_offset(new): 0x4 01:01:50 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x23) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:01:50 executing program 0: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000102, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000039400000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 01:01:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000040)={0xec4, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NODE={0xe4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "0c83460617e1d2dc70494cd1e55a381d63131dcb44"}}, @TIPC_NLA_NODE_ID={0xdf1, 0x3, "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