f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f7c0100000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000013000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:36 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 04:14:36 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f00000004c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 1391.818615][ T6414] EXT4-fs (loop1): bad geometry: block count 1040187520 exceeds size of device (66048 blocks) [ 1391.823986][ T6420] EXT4-fs (loop5): Invalid log cluster size: 301989893 04:14:36 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f000000000000000000ac0080ffffff0500f72ddf92124756d5bb0680ffffffa90000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) syz_read_part_table(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 04:14:36 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f7d0100000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000014000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:36 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 1391.926155][ T6446] loop5: detected capacity change from 0 to 2048 [ 1391.934959][ T6446] EXT4-fs (loop5): Invalid log cluster size: 318767109 [ 1391.952529][ T6458] loop1: detected capacity change from 0 to 264192 04:14:36 executing program 3: fchmodat(0xffffffffffffffff, 0x0, 0x8c68df8c17007afb) 04:14:36 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f7e0100000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1003, 0x0, 0x0) [ 1391.976006][ T6458] EXT4-fs (loop1): bad geometry: block count 1056964736 exceeds size of device (66048 blocks) [ 1392.027187][ T6474] loop5: detected capacity change from 0 to 2048 [ 1392.049693][ T6474] EXT4-fs (loop5): Invalid log cluster size: 335544325 04:14:36 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f7f0100000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:36 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) close(r0) 04:14:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040)={0x397}, 0x8) 04:14:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r0, &(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0xa) 04:14:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000015000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:36 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fab0100000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1392.103640][ T6458] loop1: detected capacity change from 0 to 264192 [ 1392.116402][ T6458] EXT4-fs (loop1): bad geometry: block count 1056964736 exceeds size of device (66048 blocks) 04:14:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r1, &(0x7f0000000040)=' ', 0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{r0, 0x40}], 0x1, 0x0) 04:14:37 executing program 2: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rmdir(&(0x7f00000001c0)='./file0\x00') 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f040200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:37 executing program 3: pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) [ 1392.190117][ T6511] loop5: detected capacity change from 0 to 2048 [ 1392.211773][ T6512] loop1: detected capacity change from 0 to 264192 [ 1392.222704][ T6511] EXT4-fs (loop5): Invalid log cluster size: 352321541 04:14:37 executing program 2: pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 04:14:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000018000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f800200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000180)="826bd9671a7ef59b6d7fe096befac80123d07aa61de6610c4c98fa66b6968bd0f20de03d31f7849af32c0bad8939465806c4b08151d642345fbb6eb648c2c91b597f15de92330a3a06485a29b12417966e8e195e3d4e99331f9ecdf82d5269fda69bd9ad776d1a1e8fd10d4e6346e4dd09cbb309a250034b996ac60dbe64b66752637629a025b4e1bab66755e9997ecfb2", 0x91, 0x8, &(0x7f0000000240)=@abs={0x0, 0x0, 0x2}, 0x8) [ 1392.256198][ T6512] EXT4-fs (loop1): bad geometry: block count 1073741952 exceeds size of device (66048 blocks) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f810200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:37 executing program 0: pipe(&(0x7f00000015c0)={0xffffffffffffffff}) fcntl$getflags(r0, 0x3) 04:14:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004106000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:37 executing program 2: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x3f60eadad6e482c6) 04:14:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000318000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1392.329796][ T6512] loop1: detected capacity change from 0 to 264192 [ 1392.337198][ T6512] EXT4-fs (loop1): bad geometry: block count 1073741952 exceeds size of device (66048 blocks) [ 1392.361921][ T6545] loop5: detected capacity change from 0 to 2048 04:14:37 executing program 3: select(0x40, &(0x7f00000001c0)={0x2}, &(0x7f0000000200)={0x3}, 0x0, 0x0) 04:14:37 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flock(r0, 0x7) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f820200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1392.390920][ T6545] EXT4-fs (loop5): Invalid log cluster size: 402653189 04:14:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x100, 0x0, 0x0) [ 1392.436727][ T6562] loop1: detected capacity change from 0 to 264192 04:14:37 executing program 2: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) socketpair(0x1, 0x5, 0x0, &(0x7f0000000540)) 04:14:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1004, 0x0, 0x0) [ 1392.479040][ T6562] EXT4-fs (loop1): bad geometry: block count 1090519168 exceeds size of device (66048 blocks) 04:14:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x80, 0x0, 0x0) 04:14:37 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) [ 1392.520450][ T6574] loop5: detected capacity change from 0 to 2048 [ 1392.556260][ T6574] EXT4-fs (loop5): Invalid log cluster size: 402849797 04:14:37 executing program 2: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) [ 1392.564831][ T6562] loop1: detected capacity change from 0 to 264192 [ 1392.592978][ T6562] EXT4-fs (loop1): bad geometry: block count 1090519168 exceeds size of device (66048 blocks) 04:14:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f830200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500d31d000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) connect(r0, &(0x7f0000000080)=@in6={0x18}, 0xc) sendmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) 04:14:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) flock(r0, 0x0) 04:14:37 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 04:14:37 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(0x0) 04:14:37 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x8000, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') 04:14:37 executing program 3: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') readlink(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f840200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1392.743687][ T6614] loop5: detected capacity change from 0 to 2048 [ 1392.761830][ T6620] loop1: detected capacity change from 0 to 264192 [ 1392.766747][ T6614] EXT4-fs (loop5): Invalid log cluster size: 500367365 04:14:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500d51d000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1392.786217][ T6620] EXT4-fs (loop1): bad geometry: block count 1107296384 exceeds size of device (66048 blocks) 04:14:37 executing program 2: semget(0x1, 0x2, 0x240) 04:14:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:37 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000040)) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f850200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:37 executing program 3: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x9f557c1ceba41ea5, 0x0) fsync(r0) 04:14:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="ac7db6d688a447374e607554705af72435ab2f56f5d0cc71e921307c64ce9d7ef0475690a6fd2779aae20e39106c0784201784c31bb49843691655ce01453441d9de89d0eeb626e2a5ea96e4873488dbc5b0a95a255333d7d500ce211eba52f48f6d0cd2e50f7521138ace80f70612e5b97252ab94c559c5788d6fb4720ec069e265dd18da9ec24ff080853aa8334f5a27", 0x91}], 0x1}, 0x0) 04:14:37 executing program 2: getgroups(0x7, &(0x7f0000000000)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0]) setregid(r0, 0x0) 04:14:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000040)="209dea832b1f4ab30b906e5d34145552861d5f1f3be55631646202080ee912b9e73ffb729473fdaccb756e459b161ffb15ed17f67cbb11787bb70776cc58b8213eb2044b4c606d686c299caa5d239f3788f8c4d09ec1a6a1ec4b4cbf1fb6a9ad88c37d93687c219dab9c2b7ef8f0e1bfc611c2bd786dd14f669327992a1617c5b8d31481d57dd18015a119b0a2411c6105", 0x91, 0xa, &(0x7f0000000140)=@un=@abs={0x0, 0x0, 0x2}, 0x8) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f9e0200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1392.912166][ T6642] loop5: detected capacity change from 0 to 2048 [ 1392.951036][ T6642] EXT4-fs (loop5): Invalid log cluster size: 500498437 04:14:37 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, 0x0, &(0x7f0000000080)) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000300000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1392.966681][ T6655] loop1: detected capacity change from 0 to 264192 [ 1392.980374][ T6655] EXT4-fs (loop1): bad geometry: block count 1124073600 exceeds size of device (66048 blocks) 04:14:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500d61d000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:37 executing program 2: utimes(0x0, &(0x7f00000000c0)={{0x0, 0x7ff8000000000000}}) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f860300000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:37 executing program 0: open$dir(&(0x7f0000000040)='./file0\x00', 0x9f557c1ceba41ea5, 0x0) 04:14:37 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 04:14:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:37 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$TIOCSPGRP(r0, 0x40047477, &(0x7f00000000c0)) 04:14:37 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f870300000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500001f000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:38 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f00000000c0)=@in6={0x18}, 0xc) [ 1393.090636][ T6655] loop1: detected capacity change from 0 to 264192 [ 1393.105119][ T6687] loop5: detected capacity change from 0 to 2048 [ 1393.113194][ T6655] EXT4-fs (loop1): bad geometry: block count 1124073600 exceeds size of device (66048 blocks) [ 1393.123611][ T6687] EXT4-fs (loop5): Invalid log cluster size: 500563973 04:14:38 executing program 2: bind(0xffffffffffffff9c, 0x0, 0x0) 04:14:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) listen(r0, 0x0) 04:14:38 executing program 2: getgroups(0x7, &(0x7f0000000000)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0]) setregid(r0, 0x0) setgid(r0) 04:14:38 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f880300000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:38 executing program 0: nanosleep(&(0x7f0000000100), 0x0) clock_gettime(0x3, &(0x7f00000001c0)) [ 1393.213583][ T6708] loop5: detected capacity change from 0 to 2048 [ 1393.225182][ T6703] loop1: detected capacity change from 0 to 264192 [ 1393.245302][ T6708] EXT4-fs (loop5): Invalid log cluster size: 520093701 04:14:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 04:14:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000020000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1393.253965][ T6703] EXT4-fs (loop1): bad geometry: block count 1140850816 exceeds size of device (66048 blocks) 04:14:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x401) 04:14:38 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f890300000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:38 executing program 0: r0 = socket(0x2, 0x3, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@un=@file={0x0, './file2/file0\x00'}, 0x10) 04:14:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1393.359358][ T6703] loop1: detected capacity change from 0 to 264192 [ 1393.367890][ T6738] loop5: detected capacity change from 0 to 2048 [ 1393.377631][ T6703] EXT4-fs (loop1): bad geometry: block count 1140850816 exceeds size of device (66048 blocks) 04:14:38 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fc10300000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005001020000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:38 executing program 3: mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x6, 0x10, 0xffffffffffffff9c, 0x0) 04:14:38 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffe0300000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1393.402536][ T6738] EXT4-fs (loop5): Invalid log cluster size: 536870917 04:14:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1008, 0x0, 0x0) [ 1393.493447][ T6761] loop1: detected capacity change from 0 to 264192 [ 1393.514307][ T6761] EXT4-fs (loop1): bad geometry: block count 1174405248 exceeds size of device (66048 blocks) [ 1393.527409][ T6772] loop5: detected capacity change from 0 to 2048 [ 1393.585471][ T6772] EXT4-fs (loop5): Invalid log cluster size: 537919493 [ 1393.596338][ T6761] loop1: detected capacity change from 0 to 264192 [ 1393.615936][ T6761] EXT4-fs (loop1): bad geometry: block count 1174405248 exceeds size of device (66048 blocks) 04:14:38 executing program 2: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:14:38 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f020400000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 04:14:38 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fcntl$setown(r0, 0x6, 0x0) 04:14:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004706000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000022000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 0: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000680)={{}, {0x0, 0xffffffffffffff7f}}, 0x0) 04:14:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0x69, 0x0, 0x0) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f060400000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1394.177830][ T6792] loop1: detected capacity change from 0 to 264192 [ 1394.192814][ T6792] EXT4-fs (loop1): bad geometry: block count 1191182464 exceeds size of device (66048 blocks) 04:14:39 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, r1) 04:14:39 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) dup2(r0, r0) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000500000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1394.223080][ T6798] loop5: detected capacity change from 0 to 2048 [ 1394.240526][ T6798] EXT4-fs (loop5): Invalid log cluster size: 570425349 04:14:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000025000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 3: r0 = socket$inet(0x11, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) recvmsg(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x1801) 04:14:39 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) chown(&(0x7f0000000480)='./file0\x00', 0x0, 0xffffffffffffffff) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000600000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1394.294023][ T6792] loop1: detected capacity change from 0 to 264192 04:14:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004806000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:39 executing program 2: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) 04:14:39 executing program 0: mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f040600000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1394.341003][ T6792] EXT4-fs (loop1): bad geometry: block count 1191182464 exceeds size of device (66048 blocks) [ 1394.373892][ T6841] loop5: detected capacity change from 0 to 2048 04:14:39 executing program 3: shmget(0x1, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 04:14:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500002e000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x800, 0x0, 0x0) [ 1394.402275][ T6841] EXT4-fs (loop5): Invalid log cluster size: 620756997 04:14:39 executing program 0: pipe2(0x0, 0x7a250f84a7a680b2) 04:14:39 executing program 2: shmget$private(0x0, 0x1000, 0x20, &(0x7f0000ffc000/0x1000)=nil) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000700000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 0: mknod$loop(&(0x7f0000000340)='./file0\x00', 0x2, 0x1) 04:14:39 executing program 0: writev(0xffffffffffffffff, &(0x7f00000006c0)=[{0x0}], 0x1) [ 1394.459555][ T6858] loop1: detected capacity change from 0 to 264192 [ 1394.483845][ T6858] EXT4-fs (loop1): bad geometry: block count 1207959680 exceeds size of device (66048 blocks) 04:14:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004906000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:39 executing program 3: pipe2(0x0, 0x3400008) 04:14:39 executing program 0: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0x69, &(0x7f0000000340)={{0x18, 0x1}, {0x18}}, 0x3c) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffc0700000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x140, 0x0) [ 1394.552429][ T6874] loop5: detected capacity change from 0 to 2048 [ 1394.567229][ T6858] loop1: detected capacity change from 0 to 264192 [ 1394.582125][ T6874] EXT4-fs (loop5): Invalid log cluster size: 771751941 [ 1394.589638][ T6858] EXT4-fs (loop1): bad geometry: block count 1207959680 exceeds size of device (66048 blocks) 04:14:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000032000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 3: shmget(0x2, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) 04:14:39 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000440)={'batadv_slave_0\x00'}) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000900000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 0: get_mempolicy(0x0, &(0x7f0000000040), 0x5, &(0x7f0000ffc000/0x1000)=nil, 0x2) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000a00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 1394.708306][ T6905] loop1: detected capacity change from 0 to 264192 [ 1394.718415][ T6905] EXT4-fs (loop1): bad geometry: block count 1224736896 exceeds size of device (66048 blocks) [ 1394.735266][ T6908] loop5: detected capacity change from 0 to 2048 04:14:39 executing program 0: timer_create(0x3, &(0x7f0000000140)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) 04:14:39 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000006200), 0x2000, 0x0) 04:14:39 executing program 2: getrusage(0x1, &(0x7f0000003180)) 04:14:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004a06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000b00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004980)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x0, 0x0) [ 1394.762845][ T6908] EXT4-fs (loop5): Invalid log cluster size: 838860805 04:14:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500003f000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000c00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fchownat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 04:14:39 executing program 2: r0 = eventfd2(0x200, 0x0) read$eventfd(r0, &(0x7f00000048c0), 0x8) 04:14:39 executing program 2: timer_create(0x0, 0x0, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}}, 0x0) 04:14:39 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000004640), 0x103000, 0x0) 04:14:39 executing program 2: mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000005) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000d00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1394.899492][ T6943] loop1: detected capacity change from 0 to 264192 04:14:39 executing program 3: mprotect(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2) 04:14:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004b06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:39 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) 04:14:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000040000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1394.943387][ T6947] loop5: detected capacity change from 0 to 2048 [ 1394.963723][ T6943] EXT4-fs (loop1): bad geometry: block count 1241514112 exceeds size of device (66048 blocks) [ 1394.977078][ T6947] EXT4-fs (loop5): Invalid log cluster size: 1056964613 04:14:39 executing program 2: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000340)={{0x77359400}}, 0x0) 04:14:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000e00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:39 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:14:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) 04:14:39 executing program 2: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) 04:14:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0xe8}, 0x80) [ 1395.073629][ T6972] loop1: detected capacity change from 0 to 264192 [ 1395.081188][ T6976] loop5: detected capacity change from 0 to 2048 [ 1395.102759][ T6976] EXT4-fs (loop5): Invalid log cluster size: 1073741829 04:14:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x40042, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 04:14:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000042000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1395.117986][ T6972] EXT4-fs (loop1): bad geometry: block count 1258291328 exceeds size of device (66048 blocks) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000f00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004c06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:40 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x200080, 0x0) 04:14:40 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x345100, 0x0) 04:14:40 executing program 0: fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f201000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f001100000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002880), 0x101000, 0x0) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f001200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 2: get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x5, &(0x7f0000ffc000/0x1000)=nil, 0x2) [ 1395.222699][ T7007] loop5: detected capacity change from 0 to 2048 [ 1395.252716][ T7007] EXT4-fs (loop5): Invalid log cluster size: 1107296261 04:14:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000048000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f001800000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) [ 1395.286451][ T7019] loop1: detected capacity change from 0 to 264192 [ 1395.342693][ T7019] EXT4-fs (loop1): bad geometry: block count 1275068544 exceeds size of device (66048 blocks) 04:14:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004d06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:40 executing program 0: pipe2$9p(&(0x7f00000002c0), 0x800) 04:14:40 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) 04:14:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500004c000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fc51d00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x80) [ 1395.385423][ T7044] loop5: detected capacity change from 0 to 2048 [ 1395.396446][ T7044] EXT4-fs (loop5): Invalid log cluster size: 1207959557 04:14:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0xc054, 0x0, 0x0) [ 1395.434510][ T7019] loop1: detected capacity change from 0 to 264192 [ 1395.442636][ T7019] EXT4-fs (loop1): bad geometry: block count 1275068544 exceeds size of device (66048 blocks) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fc81d00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cubic\x00', 0x3) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='htcp\x00', 0x5) 04:14:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000000)="1a427902733fed24ec0ffbda7828d156b58a4829b6c2a06665db5b7b514ac406b143d6c46bf9da71", 0x28, 0xc054, 0x0, 0x42) 04:14:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) [ 1395.486231][ T7063] loop5: detected capacity change from 0 to 2048 [ 1395.521871][ T7063] EXT4-fs (loop5): Invalid log cluster size: 1275068421 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f001f00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004e06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind(r0, &(0x7f0000000480)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f002000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1395.548206][ T7077] loop1: detected capacity change from 0 to 264192 [ 1395.561350][ T7077] EXT4-fs (loop1): bad geometry: block count 1291845760 exceeds size of device (66048 blocks) 04:14:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000060000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000003980), 0x0, 0x4000) 04:14:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000000), 0x0, 0x4008041, 0x0, 0x0) 04:14:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000)='}', 0x1, 0x20008090, &(0x7f0000000100)=@abs, 0x6e) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f102000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x48c0, 0x0, 0x0) 04:14:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000)='b', 0x1, 0x10, &(0x7f0000000100)=@abs, 0x6e) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f002200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, 0x0, &(0x7f0000000040)) [ 1395.666810][ T7101] loop1: detected capacity change from 0 to 264192 [ 1395.688924][ T7101] EXT4-fs (loop1): bad geometry: block count 1308622976 exceeds size of device (66048 blocks) [ 1395.706296][ T7108] loop5: detected capacity change from 0 to 2048 [ 1395.744099][ T7108] EXT4-fs (loop5): Invalid log cluster size: 1610612741 04:14:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004f06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000067000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f002500000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000240)="b4", 0x1, 0x240008c1, 0x0, 0x0) 04:14:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000780)='S', 0x1, 0x24045, &(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e) 04:14:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004340)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000), 0x0, 0x4048030, 0x0, 0xfffffe31) 04:14:40 executing program 3: fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f002e00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000040)="1f", 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x121, 0x0) 04:14:40 executing program 2: getitimer(0x3, &(0x7f0000000140)) [ 1395.803122][ T7101] loop1: detected capacity change from 0 to 264192 [ 1395.818504][ T7101] EXT4-fs (loop1): bad geometry: block count 1308622976 exceeds size of device (66048 blocks) 04:14:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000068000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004340)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x140, 0x0, 0x0) [ 1395.886876][ T7140] loop1: detected capacity change from 0 to 264192 [ 1395.903681][ T7147] loop5: detected capacity change from 0 to 2048 [ 1395.913738][ T7147] EXT4-fs (loop5): Invalid log cluster size: 1728053253 [ 1395.935697][ T7140] EXT4-fs (loop1): bad geometry: block count 1325400192 exceeds size of device (66048 blocks) [ 1395.970857][ T7166] loop5: detected capacity change from 0 to 2048 04:14:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f013000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 04:14:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100)=@abs, 0x6e) 04:14:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x8000, &(0x7f0000000680)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) 04:14:40 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a80)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000b40)) 04:14:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000069000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1396.014425][ T7166] EXT4-fs (loop5): Invalid log cluster size: 1744830469 [ 1396.025239][ T7140] loop1: detected capacity change from 0 to 264192 [ 1396.033939][ T7140] EXT4-fs (loop1): bad geometry: block count 1325400192 exceeds size of device (66048 blocks) 04:14:40 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f003200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000240), 0x0, 0x240008c1, 0x0, 0x0) 04:14:40 executing program 0: pipe2(&(0x7f0000001240)={0xffffffffffffffff}, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 04:14:41 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) 04:14:41 executing program 2: socket(0x2, 0x1, 0x7) [ 1396.111212][ T7196] loop1: detected capacity change from 0 to 264192 [ 1396.119735][ T7197] loop5: detected capacity change from 0 to 2048 [ 1396.142042][ T7196] EXT4-fs (loop1): bad geometry: block count 1342177408 exceeds size of device (66048 blocks) [ 1396.152937][ T7197] EXT4-fs (loop5): Invalid log cluster size: 1761607685 04:14:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005106000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500006a000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1396.253681][ T7196] loop1: detected capacity change from 0 to 264192 [ 1396.261806][ T7196] EXT4-fs (loop1): bad geometry: block count 1342177408 exceeds size of device (66048 blocks) [ 1396.302867][ T7234] loop5: detected capacity change from 0 to 2048 [ 1396.313164][ T7234] EXT4-fs (loop5): Invalid log cluster size: 1778384901 04:14:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f003600000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, 0x0, 0x0) 04:14:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000440)="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", 0x170, 0x4006080, 0x0, 0xffffffffffffff4c) 04:14:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500006b000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001a00), 0x0, 0x121, 0x0) 04:14:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f003700000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:41 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x8000, 0x0) 04:14:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, 0x0) 04:14:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f003800000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1396.945365][ T7249] loop1: detected capacity change from 0 to 264192 [ 1396.966335][ T7249] EXT4-fs (loop1): bad geometry: block count 1375731840 exceeds size of device (66048 blocks) [ 1396.976270][ T7253] loop5: detected capacity change from 0 to 2048 04:14:41 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0x9) 04:14:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) readv(r0, 0x0, 0x0) 04:14:41 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = eventfd(0x0) dup2(r0, r1) 04:14:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500006c000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1397.001566][ T7253] EXT4-fs (loop5): Invalid log cluster size: 1795162117 04:14:41 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = dup(r0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) 04:14:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f003900000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) dup(r0) 04:14:41 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x803, 0x0) 04:14:41 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f003a00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x40042, 0x0) [ 1397.124186][ T7285] loop1: detected capacity change from 0 to 264192 [ 1397.135793][ T7287] loop5: detected capacity change from 0 to 2048 [ 1397.151569][ T7285] EXT4-fs (loop1): bad geometry: block count 1392509056 exceeds size of device (66048 blocks) 04:14:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000074000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 04:14:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) [ 1397.169477][ T7287] EXT4-fs (loop5): Invalid log cluster size: 1811939333 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f003b00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x0) 04:14:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:42 executing program 3: pipe2(&(0x7f0000001240)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 04:14:42 executing program 2: memfd_create(&(0x7f0000000080)='net/ip6_tables_names\x00', 0x0) 04:14:42 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) [ 1397.242655][ T7311] loop5: detected capacity change from 0 to 2048 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f003c00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='oom_score_adj\x00') [ 1397.286287][ T7311] EXT4-fs (loop5): Invalid log cluster size: 1946157061 04:14:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000076000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f003f00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1397.360647][ T7337] loop1: detected capacity change from 0 to 264192 04:14:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 04:14:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup2(r0, r0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x800, 0x0) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f004000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1397.401838][ T7337] EXT4-fs (loop1): bad geometry: block count 1409286272 exceeds size of device (66048 blocks) [ 1397.426107][ T7352] loop5: detected capacity change from 0 to 2048 [ 1397.443484][ T7352] EXT4-fs (loop5): Invalid log cluster size: 1979711493 04:14:42 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 04:14:42 executing program 3: pipe2(&(0x7f0000001240)={0xffffffffffffffff}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) dup3(r1, r0, 0x0) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f004200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000077000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 04:14:42 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x103000, 0x0) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f004800000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1397.492548][ T7337] loop1: detected capacity change from 0 to 264192 [ 1397.501612][ T7337] EXT4-fs (loop1): bad geometry: block count 1409286272 exceeds size of device (66048 blocks) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f004c00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 04:14:42 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 04:14:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000078000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 3: r0 = eventfd2(0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f006000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1397.580185][ T7383] loop5: detected capacity change from 0 to 2048 [ 1397.587289][ T7386] loop1: detected capacity change from 0 to 264192 [ 1397.600759][ T7383] EXT4-fs (loop5): Invalid log cluster size: 1996488709 [ 1397.608000][ T7386] EXT4-fs (loop1): bad geometry: block count 1426063488 exceeds size of device (66048 blocks) 04:14:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = dup2(r0, r0) dup(r1) 04:14:42 executing program 0: pipe2(&(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$tcp_congestion(r0, 0x0, 0x0) [ 1397.671709][ T7386] loop1: detected capacity change from 0 to 264192 [ 1397.683774][ T7386] EXT4-fs (loop1): bad geometry: block count 1426063488 exceeds size of device (66048 blocks) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f016200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) 04:14:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000006006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:42 executing program 2: r0 = socket(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) 04:14:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x64010101}, 0x10) 04:14:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000079000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f006800000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1397.721913][ T7412] loop5: detected capacity change from 0 to 2048 [ 1397.753083][ T7412] EXT4-fs (loop5): Invalid log cluster size: 2013265925 04:14:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 04:14:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[{0x10}], 0x10}, 0x0) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f006c00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) 04:14:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[{0x18, 0x0, 0x0, "c8"}, {0x10}], 0x28}, 0x0) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f007400000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000f00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000ec0)={0x0}}, 0x0) [ 1397.851817][ T7448] loop5: detected capacity change from 0 to 2048 [ 1397.865356][ T7448] EXT4-fs (loop5): Invalid log cluster size: 2030043141 [ 1397.872559][ T7455] loop1: detected capacity change from 0 to 264192 [ 1397.882781][ T7455] EXT4-fs (loop1): bad geometry: block count 1610612864 exceeds size of device (66048 blocks) 04:14:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080007f7e06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000003c0)) 04:14:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500007a000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) poll(&(0x7f0000000040)=[{r0}, {r1, 0xa1e8}], 0x2, 0x0) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f007600000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r0, &(0x7f0000000040)={{}, "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", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1001) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f007700000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 0: socket(0x11, 0xa, 0x0) socket$inet(0x2, 0xa, 0x0) 04:14:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000010c0)={0xfffffffffffffffc, 0x0, &(0x7f0000001080)={0x0}}, 0x0) [ 1397.958631][ T7455] loop1: detected capacity change from 0 to 264192 [ 1397.996242][ T7455] EXT4-fs (loop1): bad geometry: block count 1610612864 exceeds size of device (66048 blocks) 04:14:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000005240)=[{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {0x0}, {&(0x7f0000000280)='V', 0x1}], 0x3}], 0x1, 0x0) 04:14:42 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f007800000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000386000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1398.046774][ T7491] loop5: detected capacity change from 0 to 2048 [ 1398.072816][ T7491] EXT4-fs (loop5): Invalid log cluster size: 2046820357 [ 1398.105992][ T7508] loop1: detected capacity change from 0 to 264192 [ 1398.141182][ T7520] loop5: detected capacity change from 0 to 2048 [ 1398.175499][ T7508] EXT4-fs (loop1): bad geometry: block count 2122252416 exceeds size of device (66048 blocks) [ 1398.187232][ T7520] EXT4-fs (loop5): Invalid log cluster size: 2248343557 04:14:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080007e7f06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r0, 0x0, 0x0) 04:14:43 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f007900000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:43 executing program 0: pipe(&(0x7f0000000000)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:14:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 04:14:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000387000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:43 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) sendmsg$unix(r0, &(0x7f00000009c0)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 04:14:43 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'syztnl0\x00', 0x0}) socketpair(0x15, 0x0, 0x4, &(0x7f0000000180)) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) 04:14:43 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f007a00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000388000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2000) [ 1398.296107][ T7539] loop1: detected capacity change from 0 to 264192 [ 1398.304527][ T7539] EXT4-fs (loop1): bad geometry: block count 2138964096 exceeds size of device (66048 blocks) [ 1398.318167][ T7540] loop5: detected capacity change from 0 to 2048 [ 1398.329201][ T7540] EXT4-fs (loop5): Invalid log cluster size: 2265120773 04:14:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000848006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:43 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f017a00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x401}, 0x14}}, 0x0) 04:14:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000389000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:43 executing program 0: socketpair(0x11, 0xa, 0xc28, &(0x7f00000000c0)) 04:14:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000c40), r1) accept4(r1, &(0x7f0000000000)=@caif=@dbg, &(0x7f0000000080)=0x80, 0x80000) connect(r0, &(0x7f0000000240)=@l2tp, 0x80) socketpair(0x11, 0xa, 0xc28, &(0x7f00000000c0)) [ 1398.399128][ T7561] loop5: detected capacity change from 0 to 2048 [ 1398.417255][ T7561] EXT4-fs (loop5): Invalid log cluster size: 2281897989 04:14:43 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f017b00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1398.477212][ T7576] loop1: detected capacity change from 0 to 264192 [ 1398.511546][ T7576] EXT4-fs (loop1): bad geometry: block count 2156134528 exceeds size of device (66048 blocks) [ 1398.523528][ T7590] loop5: detected capacity change from 0 to 2048 [ 1398.582430][ T7590] EXT4-fs (loop5): Invalid log cluster size: 2298675205 [ 1398.591445][ T7576] loop1: detected capacity change from 0 to 264192 [ 1398.599012][ T7576] EXT4-fs (loop1): bad geometry: block count 2156134528 exceeds size of device (66048 blocks) 04:14:44 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f017c00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:44 executing program 2: pipe(&(0x7f0000001140)={0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) poll(&(0x7f0000001400)=[{r0}, {r1}], 0x2, 0x6) 04:14:44 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000600), 0xffffffffffffffff) 04:14:44 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000400)=0x8001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x4d) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 04:14:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500009f000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000868006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:44 executing program 2: pipe(&(0x7f0000000840)) 04:14:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000500)={0x268, 0x1, 0x5, 0x201, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "6bc0b16a0436f91eac08cd8c114951ba050d84f4cde719925e6bd0d0e9b48d03", "1c8aad1ac53e1454c967cb7d26665bd0b02430ee08ec3df918186a0545fc0c66", [{}, {}, {}, {0x80}, {}, {}, {0x81, 0x7}, {}, {}, {}, {}, {}, {0x6, 0x3}, {}, {}, {0xff}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x7}}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {}, {}, {}, {}, {}, {0x1}]}}}]}, 0x268}}, 0x0) 04:14:44 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f017d00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:44 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f017e00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000000580)={0x1, 0x0, ['\x00']}) [ 1399.239826][ T7615] loop5: detected capacity change from 0 to 2048 [ 1399.248870][ T7624] loop1: detected capacity change from 0 to 264192 [ 1399.257253][ T7615] EXT4-fs (loop5): Invalid log cluster size: 2667577349 [ 1399.265145][ T7624] EXT4-fs (loop1): bad geometry: block count 2156265600 exceeds size of device (66048 blocks) 04:14:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000034c0)={0x14, 0x12, 0x2, 0x3}, 0x14}}, 0x0) 04:14:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050003c1000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000898006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:44 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0xd8}, 0x0) poll(&(0x7f00000000c0), 0xa5, 0x0) [ 1399.372747][ T7649] loop5: detected capacity change from 0 to 2048 [ 1399.380935][ T7649] EXT4-fs (loop5): Invalid log cluster size: 3238199301 [ 1399.437522][ T7655] loop1: detected capacity change from 0 to 264192 [ 1399.450538][ T7655] EXT4-fs (loop1): bad geometry: block count 2156462208 exceeds size of device (66048 blocks) 04:14:44 executing program 0: r0 = socket(0x11, 0xa, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000080)) 04:14:44 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f017f00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:44 executing program 2: poll(&(0x7f0000000040)=[{}], 0x2, 0x0) 04:14:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000640)='b', 0x1}], 0x2}, 0x0) 04:14:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005001dd3000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080008e8006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) getsockname(r0, 0x0, &(0x7f0000000140)) 04:14:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f028000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x10}], 0x10}, 0x0) 04:14:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x4d) 04:14:45 executing program 3: socket(0x0, 0xd8c7761b0fe4115c, 0x0) [ 1400.159263][ T7682] loop5: detected capacity change from 0 to 2048 [ 1400.167446][ T7682] EXT4-fs (loop5): Invalid log cluster size: 3541893125 [ 1400.175395][ T7680] loop1: detected capacity change from 0 to 264192 [ 1400.186417][ T7680] EXT4-fs (loop1): bad geometry: block count 2156789888 exceeds size of device (66048 blocks) 04:14:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005001dd5000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000a48006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f028100000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:45 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) 04:14:45 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)) 04:14:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc20040}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) [ 1400.301838][ T7709] loop5: detected capacity change from 0 to 2048 [ 1400.317331][ T7709] EXT4-fs (loop5): Invalid log cluster size: 3575447557 [ 1400.329277][ T7713] loop1: detected capacity change from 0 to 264192 04:14:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000ab8006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005001dd6000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1400.341664][ T7713] EXT4-fs (loop1): bad geometry: block count 2158231680 exceeds size of device (66048 blocks) 04:14:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f028200000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x2) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1400.439777][ T7736] loop1: detected capacity change from 0 to 264192 [ 1400.454864][ T7736] EXT4-fs (loop1): bad geometry: block count 2158690432 exceeds size of device (66048 blocks) [ 1400.463752][ T7740] loop5: detected capacity change from 0 to 2048 [ 1400.480233][ T7740] EXT4-fs (loop5): Invalid log cluster size: 3592224773 04:14:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_aout(r0, &(0x7f0000000300)={{0x10b}, "", ['\x00']}, 0x120) 04:14:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) 04:14:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f028300000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 04:14:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000b68006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050000e7000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000580)="777e25b74e16b1e404e91034a3ad3a", 0xf}, {&(0x7f0000000640)='b', 0x1}], 0x2}, 0x0) 04:14:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000480)=@abs={0x7}, 0x6e) 04:14:46 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f028400000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500c0ed000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:46 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x10, 0x1}], 0x10}, 0x0) 04:14:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc20040}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) [ 1401.167376][ T7766] loop5: detected capacity change from 0 to 2048 [ 1401.173949][ T7761] loop1: detected capacity change from 0 to 264192 [ 1401.190706][ T7766] EXT4-fs (loop5): Invalid log cluster size: 3875536901 [ 1401.191467][ T7761] EXT4-fs (loop1): bad geometry: block count 2159411328 exceeds size of device (66048 blocks) 04:14:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x20}, 0x0) 04:14:46 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f028500000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@abs={0x1}, 0x6e) 04:14:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000808406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1401.297888][ T7791] loop5: detected capacity change from 0 to 2048 [ 1401.330669][ T7761] loop1: detected capacity change from 0 to 264192 04:14:46 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x4bf88a67) 04:14:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@abs, 0x6e) 04:14:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, 0x0, 0x100) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 04:14:46 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f038600000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1401.345686][ T7761] EXT4-fs (loop1): bad geometry: block count 2159411328 exceeds size of device (66048 blocks) [ 1401.352409][ T7791] EXT4-fs (loop5): Invalid log cluster size: 3988783109 04:14:46 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, 0x0, 0x0) 04:14:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050007fc000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:46 executing program 0: poll(&(0x7f00000000c0), 0xa5, 0x0) 04:14:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x2) 04:14:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x5452, &(0x7f0000000200)) 04:14:46 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f038700000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:46 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) [ 1401.463625][ T7813] loop1: detected capacity change from 0 to 264192 [ 1401.476397][ T7813] EXT4-fs (loop1): bad geometry: block count 2222981248 exceeds size of device (66048 blocks) 04:14:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000808606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1401.558983][ T7835] loop5: detected capacity change from 0 to 2048 [ 1401.595076][ T7835] EXT4-fs (loop5): Invalid log cluster size: 4228317189 [ 1401.620963][ T7853] loop1: detected capacity change from 0 to 264192 [ 1401.631272][ T7853] EXT4-fs (loop1): bad geometry: block count 2256535680 exceeds size of device (66048 blocks) [ 1401.698872][ T7853] loop1: detected capacity change from 0 to 264192 [ 1401.711561][ T7853] EXT4-fs (loop1): bad geometry: block count 2256535680 exceeds size of device (66048 blocks) 04:14:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) getsockname(r0, &(0x7f0000000800)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000880)=0x80) 04:14:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@dev}, @generic="cf"]}, 0x2c}}, 0x0) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f038800000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) getsockname(r0, 0x0, 0x0) 04:14:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffe000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000808906000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f038900000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 3: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'team0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) 04:14:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 04:14:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050001ff000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1402.271704][ T7871] loop5: detected capacity change from 0 to 2048 [ 1402.273519][ T7872] loop1: detected capacity change from 0 to 264192 [ 1402.279112][ T7876] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1402.294688][ T7872] EXT4-fs (loop1): bad geometry: block count 2306867328 exceeds size of device (66048 blocks) [ 1402.307208][ T7871] EXT4-fs (loop5): Invalid log cluster size: 4278124549 04:14:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000808e06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) poll(&(0x7f0000000040)=[{r0}, {r1, 0xa1e8}], 0x2, 0x4bf88a67) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f009d00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80009, 0x0, &(0x7f0000000680)) 04:14:47 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f009e00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000017c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x2040, 0x0, 0x0) 04:14:47 executing program 3: timer_create(0x0, 0x0, &(0x7f00000002c0)=0x0) timer_settime(r0, 0x1, &(0x7f0000000300)={{0x77359400}}, &(0x7f0000000340)) 04:14:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000fff000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1402.418814][ T7898] loop5: detected capacity change from 0 to 2048 [ 1402.427943][ T7898] EXT4-fs (loop5): Invalid log cluster size: 4278255621 [ 1402.445901][ T7900] loop1: detected capacity change from 0 to 264192 04:14:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000013c0)={&(0x7f0000000f00), 0xc, &(0x7f0000001380)={0x0}}, 0x47) 04:14:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) [ 1402.490015][ T7900] EXT4-fs (loop1): bad geometry: block count 2390753408 exceeds size of device (66048 blocks) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f029e00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1402.547799][ T7900] loop1: detected capacity change from 0 to 264192 [ 1402.568388][ T7900] EXT4-fs (loop1): bad geometry: block count 2390753408 exceeds size of device (66048 blocks) [ 1402.584572][ T7932] loop5: detected capacity change from 0 to 2048 04:14:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800080a406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x10}}], 0x30}, 0x0) 04:14:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x2040) 04:14:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500feff000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f009f00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000080)=@abs={0x1}, 0x6e) getpeername$unix(r0, 0x0, &(0x7f0000000040)=0xffffff82) [ 1402.608792][ T7932] EXT4-fs (loop5): Invalid log cluster size: 4279173125 04:14:47 executing program 2: r0 = socket(0x11, 0xa, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x40000020, 0x0, 0x0) 04:14:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 04:14:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x8918, &(0x7f0000000200)) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f01ab00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800080ab06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1402.685807][ T7954] loop1: detected capacity change from 0 to 264192 [ 1402.695772][ T7953] loop5: detected capacity change from 0 to 2048 [ 1402.714318][ T7954] EXT4-fs (loop1): bad geometry: block count 2759852160 exceeds size of device (66048 blocks) 04:14:47 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) pipe(&(0x7f0000000140)) 04:14:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) [ 1402.748117][ T7953] EXT4-fs (loop5): Invalid log cluster size: 4294836229 04:14:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000020004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000800), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x101, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f03c100000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 3: socketpair(0x18, 0x3, 0x401, &(0x7f0000000000)) socketpair(0x6, 0x80009, 0x0, &(0x7f0000000680)) [ 1402.817783][ T7979] loop1: detected capacity change from 0 to 264192 04:14:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800080b606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:47 executing program 2: socket(0x25, 0x3, 0x9) 04:14:47 executing program 0: socket(0x2c, 0x3, 0xfffffffc) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f1dc500000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1402.869594][ T7979] EXT4-fs (loop1): bad geometry: block count 2877292672 exceeds size of device (66048 blocks) [ 1402.903777][ T7997] loop5: detected capacity change from 0 to 2048 04:14:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) [ 1402.953941][ T7997] EXT4-fs (loop5): blocks per group (262146) and clusters per group (16384) inconsistent [ 1402.992345][ T8022] loop1: detected capacity change from 0 to 264192 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f1dc800000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500ffff030004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e23}, 0x6e) [ 1403.001945][ T8022] EXT4-fs (loop1): bad geometry: block count 3061842048 exceeds size of device (66048 blocks) 04:14:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x40012103, 0x0, 0x0) 04:14:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fc0ed00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:47 executing program 3: r0 = socket(0x11, 0xa, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000080)=0x7) 04:14:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@typed={0x14, 0x13, 0x0, 0x0, @ipv6=@dev}, @generic="cf"]}, 0x2c}}, 0x0) [ 1403.108330][ T8046] loop5: detected capacity change from 0 to 2048 [ 1403.118379][ T8046] EXT4-fs (loop5): Invalid log cluster size: 4294901765 [ 1403.124762][ T8022] loop1: detected capacity change from 0 to 264192 04:14:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000040)=@abs, 0x6e, 0x0}, 0x0) 04:14:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000040004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f07fc00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000f506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:48 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) 04:14:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x2, 0x439d, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) [ 1403.149279][ T8022] EXT4-fs (loop1): bad geometry: block count 3061842048 exceeds size of device (66048 blocks) [ 1403.179226][ T8061] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:14:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x801) 04:14:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f03fe00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 04:14:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000c80)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 04:14:48 executing program 0: syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 04:14:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000fffe06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1403.279793][ T8074] loop5: detected capacity change from 0 to 2048 [ 1403.297361][ T8083] loop1: detected capacity change from 0 to 264192 [ 1403.306575][ T8074] EXT4-fs (loop5): blocks per group (262148) and clusters per group (16384) inconsistent [ 1403.318689][ T8083] EXT4-fs (loop1): bad geometry: block count 4110418048 exceeds size of device (66048 blocks) 04:14:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffe00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000080004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:48 executing program 0: socket(0x11, 0xa, 0x300) 04:14:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xfffffffffffffdf8, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="001525bd7000fddbdf25410000000c009900009600000104000008009f0004000000"], 0x28}, 0x1, 0x0, 0x0, 0x8800}, 0xc000) 04:14:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f01ff00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_timeval(r0, 0x1, 0x42, 0x0, &(0x7f0000000040)) 04:14:48 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, 0x0, 0x0) 04:14:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) poll(&(0x7f0000000340)=[{r0, 0x1600}], 0x1, 0xffffc0d1) 04:14:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000fff06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1403.445390][ T8111] loop1: detected capacity change from 0 to 264192 [ 1403.470196][ T8111] EXT4-fs (loop1): bad geometry: block count 4278124672 exceeds size of device (66048 blocks) [ 1403.488209][ T8118] loop5: detected capacity change from 0 to 2048 [ 1403.527582][ T8118] EXT4-fs (loop5): blocks per group (262152) and clusters per group (16384) inconsistent [ 1403.579181][ T8136] loop1: detected capacity change from 0 to 264192 [ 1403.588227][ T8136] EXT4-fs (loop1): bad geometry: block count 4279173248 exceeds size of device (66048 blocks) 04:14:49 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 04:14:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x184011, r0, 0x0) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0fff00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 04:14:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005004000080004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000feff06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) 04:14:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, 0x0) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffeff00000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 04:14:49 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) [ 1404.248951][ T8150] loop5: detected capacity change from 0 to 2048 [ 1404.267000][ T8154] loop1: detected capacity change from 0 to 264192 [ 1404.267258][ T8150] EXT4-fs (loop5): Invalid log cluster size: 4194309 [ 1404.284149][ T8154] EXT4-fs (loop1): bad geometry: block count 4294836352 exceeds size of device (66048 blocks) 04:14:49 executing program 0: pipe(&(0x7f0000001140)={0xffffffffffffffff}) poll(&(0x7f0000001400)=[{r0}], 0x1, 0x6) 04:14:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050000000c0004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000fffffffe0000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000002000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x11, 0xa, 0xc28, &(0x7f00000000c0)) [ 1404.346830][ T8154] loop1: detected capacity change from 0 to 264192 [ 1404.361271][ T8154] EXT4-fs (loop1): bad geometry: block count 4294836352 exceeds size of device (66048 blocks) 04:14:49 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 04:14:49 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt(r0, 0x6, 0x0, 0x0, 0x0) 04:14:49 executing program 2: msgsnd(0xffffffffffffffff, &(0x7f0000000200), 0x4, 0x0) 04:14:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000005000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffff03000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000780)={0x0, 0x9, &(0x7f0000000700)="5059e2a48517210149"}) r1 = syz_open_dev$evdev(&(0x7f00000007c0), 0x0, 0x200000) ioctl$EVIOCGKEYCODE(r1, 0x80084504, 0x0) 04:14:49 executing program 2: syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) syz_open_dev$evdev(&(0x7f0000001540), 0x9, 0x240040) [ 1404.464690][ T8189] loop5: detected capacity change from 0 to 2048 [ 1404.464791][ T8197] loop1: detected capacity change from 0 to 264192 [ 1404.489202][ T8197] EXT4-fs (loop1): bad geometry: block count 4294901888 exceeds size of device (66048 blocks) [ 1404.501978][ T8189] EXT4-fs (loop5): blocks per group (262156) and clusters per group (16384) inconsistent 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000004000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000180004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[{0x10, 0x1}], 0x10}, 0x0) 04:14:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000008000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r0, 0x7e2780e3) 04:14:49 executing program 3: setitimer(0x1, &(0x7f00000000c0)={{}, {0x5}}, 0x0) [ 1404.634541][ T8226] loop1: detected capacity change from 0 to 264192 [ 1404.660562][ T8227] loop5: detected capacity change from 0 to 2048 [ 1404.672272][ T8227] EXT4-fs (loop5): blocks per group (262168) and clusters per group (16384) inconsistent 04:14:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001400)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x40001) [ 1404.704094][ T8226] EXT4-fs error (device loop1): ext4_quota_enable:6430: inode #3: comm syz-executor.1: casefold flag without casefold feature 04:14:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000400004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f400008000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:49 executing program 2: pipe2(&(0x7f0000000600)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000680)=[{0xffffffffffffff9c}, {}, {r0}, {}], 0x200000000000018d, &(0x7f00000006c0)={0x7}, &(0x7f0000000700), 0x8) 04:14:49 executing program 0: mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x9) 04:14:49 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) fchdir(r0) [ 1404.743958][ T8226] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,noblock_validity,,errors=continue. Quota mode: writeback. [ 1404.757933][ T8226] ext4 filesystem being mounted at /root/syzkaller-testdir559398582/syzkaller.g9IK0s/5252/file0 supports timestamps until 2038 (0x7fffffff) 04:14:49 executing program 0: execve(0x0, &(0x7f0000000480), 0x0) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000c000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 2: setitimer(0x0, &(0x7f00000000c0), 0x0) 04:14:49 executing program 0: open$dir(&(0x7f0000000640)='./file0\x00', 0x200, 0x0) 04:14:49 executing program 3: pipe2(&(0x7f0000003a80)={0xffffffffffffffff}, 0x0) fchown(r0, 0x0, 0x0) 04:14:49 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x6c}, 0x0) pipe2(&(0x7f0000000600)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000680)=[{0xffffffffffffff9c}, {}, {r0}, {}], 0x200000000000018d, &(0x7f00000006c0)={0x7}, &(0x7f0000000700), 0x8) [ 1404.851285][ T8264] loop5: detected capacity change from 0 to 2048 [ 1404.889344][ T8264] EXT4-fs (loop5): blocks per group (262208) and clusters per group (16384) inconsistent [ 1404.931327][ T8285] loop1: detected capacity change from 0 to 264192 04:14:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500ffffe00004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000018000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1404.977201][ T8285] EXT4-fs (loop1): bad geometry: block count 33554560 exceeds size of device (66048 blocks) 04:14:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:49 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001cc0)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 04:14:49 executing program 3: pipe2(0x0, 0xfb58a89e7af7c678) 04:14:49 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto(r0, &(0x7f0000000100)='\'', 0x1, 0x0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000040000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000104000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1405.027264][ T8303] loop5: detected capacity change from 0 to 2048 [ 1405.038924][ T8303] EXT4-fs (loop5): Invalid log cluster size: 4294901765 [ 1405.055816][ T8285] loop1: detected capacity change from 0 to 264192 [ 1405.063839][ T8285] EXT4-fs (loop1): bad geometry: block count 33554560 exceeds size of device (66048 blocks) 04:14:49 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffe0000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:49 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{0x0, 0x4}, {0x0, 0x3f}}, &(0x7f0000000100)) 04:14:49 executing program 0: socketpair(0x17, 0x0, 0xff, 0x0) [ 1405.116352][ T8323] loop1: detected capacity change from 0 to 264192 [ 1405.130682][ T8323] EXT4-fs (loop1): bad geometry: block count 50331776 exceeds size of device (66048 blocks) 04:14:50 executing program 3: symlinkat(0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) 04:14:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000010000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r0, 0x7e2780e3) mlockall(0x2) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1, 0x12, r1, 0x0) 04:14:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:50 executing program 0: setitimer(0x0, &(0x7f00000000c0)={{0x0, 0x4}, {0x0, 0x3f}}, 0x0) [ 1405.191017][ T8335] loop5: detected capacity change from 0 to 2048 [ 1405.206464][ T8335] EXT4-fs (loop5): blocks per group (262400) and clusters per group (16384) inconsistent 04:14:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000204000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffb8010000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 2: pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000680)=[{r0, 0x40}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000000)="9f", 0x1) 04:14:50 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r0, 0x7e2780e3) socket$inet6_udplite(0x1c, 0x2, 0x88) 04:14:50 executing program 0: setitimer(0x1, &(0x7f00000000c0)={{0x0, 0x4}, {0x5}}, &(0x7f0000000100)) 04:14:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000020000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 3: r0 = socket(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) sendto$inet(r1, &(0x7f0000000300)="a9", 0x1, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) shutdown(r1, 0x1) dup2(r0, r1) 04:14:50 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x19, &(0x7f0000000080), 0x0) [ 1405.339468][ T8363] loop5: detected capacity change from 0 to 2048 [ 1405.344783][ T8365] loop1: detected capacity change from 0 to 264192 [ 1405.362881][ T8365] EXT4-fs (loop1): bad geometry: block count 67108992 exceeds size of device (66048 blocks) 04:14:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000004020000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 3: execve(0x0, &(0x7f0000000480), &(0x7f0000000580)=[&(0x7f00000004c0)=']%\x00']) [ 1405.386405][ T8363] EXT4-fs (loop5): blocks per group (262656) and clusters per group (16384) inconsistent 04:14:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffb8020000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000680)='htcp\x00', 0x5) 04:14:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000040204000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, &(0x7f0000000000)={0x0, 0x0, 0x1}, 0x8) 04:14:50 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) readv(r0, 0x0, 0x0) [ 1405.454195][ T8365] loop1: detected capacity change from 0 to 264192 [ 1405.490155][ T8365] EXT4-fs (loop1): bad geometry: block count 67108992 exceeds size of device (66048 blocks) 04:14:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 04:14:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000680)=[{r0}], 0x1, &(0x7f00000006c0), 0x0, 0x0) 04:14:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000030000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002000)={0x0, 0x0, 0x0}, 0x0) [ 1405.599150][ T8413] loop1: detected capacity change from 0 to 264192 [ 1405.619957][ T8417] loop5: detected capacity change from 0 to 2048 [ 1405.626721][ T8413] EXT4-fs (loop1): bad geometry: block count 83886208 exceeds size of device (66048 blocks) 04:14:50 executing program 0: pipe2(&(0x7f0000000600)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000680)=[{r0}], 0x1, &(0x7f00000006c0), 0x0, 0x0) 04:14:50 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200, 0x0) [ 1405.652533][ T8417] EXT4-fs (loop5): blocks per group (262660) and clusters per group (16384) inconsistent 04:14:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:50 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000304000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffb8030000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:50 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x13, 0x0, &(0x7f0000000240)) 04:14:50 executing program 3: lchown(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0) 04:14:50 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000040000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1405.711514][ T8413] loop1: detected capacity change from 0 to 264192 [ 1405.733494][ T8413] EXT4-fs (loop1): bad geometry: block count 83886208 exceeds size of device (66048 blocks) [ 1405.807035][ T8454] loop5: detected capacity change from 0 to 2048 [ 1405.847808][ T8454] EXT4-fs (loop5): blocks per group (262912) and clusters per group (16384) inconsistent [ 1405.860838][ T8469] loop1: detected capacity change from 0 to 264192 [ 1405.874031][ T8469] EXT4-fs (loop1): bad geometry: block count 100663424 exceeds size of device (66048 blocks) 04:14:51 executing program 2: fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0xffffffffffffffff, 0x0) 04:14:51 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) readv(r0, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}], 0x3) 04:14:51 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg$unix(r0, &(0x7f00000013c0)={&(0x7f0000001200)=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000001380)=[@rights], 0x10}, 0x0) 04:14:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffb8040000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000706000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000404000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000050000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffb8050000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 3: openat$ptmx(0xffffff9c, &(0x7f0000000440), 0x0, 0x0) 04:14:51 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x6c}, 0x0) 04:14:51 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) [ 1406.490142][ T8485] loop1: detected capacity change from 0 to 264192 [ 1406.497789][ T8488] loop5: detected capacity change from 0 to 2048 [ 1406.504924][ T8485] EXT4-fs (loop1): bad geometry: block count 117440640 exceeds size of device (66048 blocks) [ 1406.525241][ T8488] EXT4-fs (loop5): blocks per group (263168) and clusters per group (16384) inconsistent 04:14:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000504000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 2: ppoll(&(0x7f0000000680)=[{0xffffffffffffff9c}, {}, {}, {}], 0x200000000000018d, &(0x7f00000006c0), &(0x7f0000000700), 0x8) 04:14:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000060000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x40049409, 0x0) 04:14:51 executing program 0: symlink(&(0x7f0000002340)='./file0\x00', 0x0) 04:14:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000806000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000604000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 2: mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) [ 1406.663154][ T8521] loop5: detected capacity change from 0 to 2048 [ 1406.675875][ T8521] EXT4-fs (loop5): blocks per group (263424) and clusters per group (16384) inconsistent 04:14:51 executing program 3: openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x2000000, 0x0) 04:14:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000004060000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 0: r0 = socket(0x1c, 0x3, 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 04:14:51 executing program 2: ppoll(&(0x7f0000000680)=[{}, {}], 0x2, &(0x7f00000006c0), 0x0, 0x0) 04:14:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffb8060000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1406.719651][ T8534] loop1: detected capacity change from 0 to 264192 [ 1406.736251][ T8534] EXT4-fs (loop1): bad geometry: block count 134217856 exceeds size of device (66048 blocks) 04:14:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000906000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1406.780868][ T8539] loop5: detected capacity change from 0 to 2048 04:14:51 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8901, 0x0) 04:14:51 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000001380)=[{&(0x7f0000000080)='<', 0x1}, {&(0x7f0000000280)='8', 0x1}, {&(0x7f0000000340)='J', 0x1}, {&(0x7f0000001340)="98", 0x1}]) 04:14:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000070000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000040604000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}, {&(0x7f0000000100)=""/164, 0xa4}, {&(0x7f0000000200)=""/220, 0xdc}], 0x3, 0x0, 0x0) [ 1406.829069][ T8539] EXT4-fs (loop5): blocks per group (263680) and clusters per group (16384) inconsistent 04:14:51 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5460, 0x0) 04:14:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x6, 0xdb, 0x0, 0x800}]}) 04:14:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000080000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1406.889393][ T8567] loop1: detected capacity change from 0 to 264192 [ 1406.921526][ T8567] EXT4-fs (loop1): bad geometry: block count 150995072 exceeds size of device (66048 blocks) 04:14:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x3) 04:14:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) [ 1406.971098][ T8581] loop5: detected capacity change from 0 to 2048 [ 1406.994921][ T8581] EXT4-fs (loop5): blocks per group (263684) and clusters per group (16384) inconsistent 04:14:51 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000704000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1407.034135][ T25] audit: type=1326 audit(1621052091.837:4397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8589 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 1407.073796][ T8567] loop1: detected capacity change from 0 to 264192 04:14:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000a06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, &(0x7f00000008c0)={0x0, 0x0}) 04:14:51 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000090000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:51 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0xc0189436, 0x0) [ 1407.093989][ T8567] EXT4-fs (loop1): bad geometry: block count 150995072 exceeds size of device (66048 blocks) [ 1407.119939][ T8607] loop5: detected capacity change from 0 to 2048 04:14:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x7, 0x1, 0x201}, 0x14}}, 0x0) 04:14:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000804000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 2: clone(0xcc128000, 0x0, 0x0, 0x0, 0x0) 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000000a0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1407.144516][ T8607] EXT4-fs (loop5): blocks per group (263936) and clusters per group (16384) inconsistent 04:14:52 executing program 3: socketpair(0x10, 0x2, 0x0, &(0x7f00000000c0)) [ 1407.198488][ T8615] loop1: detected capacity change from 0 to 264192 04:14:52 executing program 0: r0 = eventfd(0x0) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) 04:14:52 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8941, 0x0) [ 1407.245056][ T8615] EXT4-fs (loop1): bad geometry: block count 167772288 exceeds size of device (66048 blocks) [ 1407.283845][ T8633] loop5: detected capacity change from 0 to 2048 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000000b0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1407.294688][ T8633] EXT4-fs (loop5): blocks per group (264192) and clusters per group (16384) inconsistent 04:14:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000b06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:52 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x80000001}]) 04:14:52 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/timer_list\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}, {&(0x7f0000000100)=""/164, 0xa4}, {&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f0000000200)=""/220, 0xdc}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f00000003c0)=""/72, 0xfffffda1}], 0xf00, 0x0, 0x0) 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000000c0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000904000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/tty/drivers\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}, {&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000200)=""/220, 0xdc}], 0x3, 0x0, 0x0) [ 1407.383344][ T8615] loop1: detected capacity change from 0 to 264192 [ 1407.392682][ T8615] EXT4-fs (loop1): bad geometry: block count 167772288 exceeds size of device (66048 blocks) 04:14:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, r1, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) 04:14:52 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b311fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e919f130dec95128ce7ec033dc0a380543bfc99320b", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 04:14:52 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8915, 0x0) 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000000d0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000a04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1407.445471][ T8671] loop5: detected capacity change from 0 to 2048 [ 1407.456130][ T8671] EXT4-fs (loop5): blocks per group (264448) and clusters per group (16384) inconsistent [ 1407.484713][ T8672] loop1: detected capacity change from 0 to 264192 04:14:52 executing program 3: clone(0x21001100, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 1407.506631][ T8672] EXT4-fs (loop1): bad geometry: block count 184549504 exceeds size of device (66048 blocks) 04:14:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000c06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000000e0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf2502", @ANYRES32], 0xa0}}, 0x0) 04:14:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000580)={0xfffffffffffffffe, 0x0, &(0x7f0000000540)={0x0, 0xf0ff7f}}, 0x0) 04:14:52 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000580)={0xfffffffffffffffe, 0x0, &(0x7f0000000540)={0x0}, 0x300}, 0x0) 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000000f0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000b04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1407.587077][ T8701] loop5: detected capacity change from 0 to 2048 [ 1407.596305][ T8672] loop1: detected capacity change from 0 to 264192 [ 1407.606198][ T8701] EXT4-fs (loop5): blocks per group (264704) and clusters per group (16384) inconsistent [ 1407.623653][ T8672] EXT4-fs (loop1): bad geometry: block count 184549504 exceeds size of device (66048 blocks) 04:14:52 executing program 0: r0 = socket(0x1, 0x5, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={0x0}}, 0x0) 04:14:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x20, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) rmdir(&(0x7f0000000380)='./file0/file0\x00') setgid(0x0) lstat(&(0x7f0000000080)='./file0\x00', 0x0) chdir(&(0x7f0000000340)='./file0/file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r0, r0) 04:14:52 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8953, 0x0) 04:14:52 executing program 2: socket(0x2, 0x3, 0x6) 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000100000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000d06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1407.704755][ T8727] loop1: detected capacity change from 0 to 264192 [ 1407.724167][ T8727] EXT4-fs (loop1): bad geometry: block count 201326720 exceeds size of device (66048 blocks) [ 1407.743683][ T8731] loop5: detected capacity change from 0 to 2048 04:14:52 executing program 0: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') mq_getsetattr(r0, &(0x7f0000000240), 0x0) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:52 executing program 2: write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x8000100, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) [ 1407.785602][ T8731] EXT4-fs (loop5): blocks per group (264960) and clusters per group (16384) inconsistent [ 1407.825539][ T8749] new mount options do not match the existing superblock, will be ignored 04:14:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000c04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000110000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000120000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0}]) [ 1407.853791][ T8751] loop1: detected capacity change from 0 to 264192 [ 1407.861627][ T8751] EXT4-fs (loop1): bad geometry: block count 218103936 exceeds size of device (66048 blocks) [ 1407.878539][ T8755] new mount options do not match the existing superblock, will be ignored 04:14:52 executing program 3: clone(0x49040f00, 0x0, 0x0, 0x0, 0x0) 04:14:52 executing program 2: r0 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) fstatfs(r0, 0x0) unlinkat(r0, &(0x7f0000001580)='./file0\x00', 0x200) 04:14:52 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000d04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000580)={0xfffffffffffffffe, 0x700, &(0x7f0000000540)={0x0}}, 0x0) [ 1407.941031][ T8771] loop5: detected capacity change from 0 to 2048 [ 1407.964611][ T8771] EXT4-fs (loop5): blocks per group (265216) and clusters per group (16384) inconsistent [ 1407.967736][ T8751] loop1: detected capacity change from 0 to 264192 04:14:52 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/216, 0xd8}], 0x1, 0x2, 0x0, 0x0) 04:14:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000e06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) 04:14:52 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000001f0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x6}]}) 04:14:52 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/vmallocinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/202, 0xca}], 0x1, 0x0, 0x0) [ 1408.046733][ T8751] EXT4-fs (loop1): bad geometry: block count 218103936 exceeds size of device (66048 blocks) [ 1408.065611][ T8801] loop5: detected capacity change from 0 to 2048 [ 1408.074831][ T8801] EXT4-fs (loop5): blocks per group (265472) and clusters per group (16384) inconsistent 04:14:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000e04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 2: clone(0x230400, 0x0, 0x0, 0x0, 0x0) 04:14:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000200000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1408.161781][ T25] audit: type=1326 audit(1621052092.957:4398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8817 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 04:14:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000010200000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_elf32(r0, &(0x7f00000025c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 04:14:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/handlers\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}], 0x1, 0x3, 0x0) 04:14:53 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8912, 0x0) 04:14:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000f06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1408.211361][ T8826] loop5: detected capacity change from 0 to 2048 [ 1408.221024][ T8826] EXT4-fs (loop5): blocks per group (265728) and clusters per group (16384) inconsistent 04:14:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000f04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000220000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5451, 0x0) 04:14:53 executing program 0: clone(0xa0040280, 0x0, 0x0, 0x0, 0x0) 04:14:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)={0x14, 0xd, 0xa, 0x5}, 0x14}}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 04:14:53 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/mnt\x00') 04:14:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000250000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000001004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1408.359171][ T8852] loop1: detected capacity change from 0 to 264192 [ 1408.372443][ T8853] loop5: detected capacity change from 0 to 2048 [ 1408.382231][ T8853] EXT4-fs (loop5): blocks per group (265984) and clusters per group (16384) inconsistent 04:14:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0xf00, &(0x7f0000000880)=[{}]}) 04:14:53 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x890b, 0x0) 04:14:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf2502"], 0xa0}}, 0x0) [ 1408.435731][ T8852] EXT4-fs (loop1): bad geometry: block count 251658368 exceeds size of device (66048 blocks) [ 1408.516658][ T8880] loop5: detected capacity change from 0 to 2048 [ 1408.525920][ T8880] EXT4-fs (loop5): blocks per group (266240) and clusters per group (16384) inconsistent [ 1408.535148][ T8852] loop1: detected capacity change from 0 to 264192 04:14:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000001104000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 0: clone(0xd0040000, 0x0, 0x0, 0x0, &(0x7f0000001280)) 04:14:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000002e0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sysvipc/shm\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}, {&(0x7f0000000100)=""/164, 0xa4}, {&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f0000000200)=""/220, 0xdc}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f00000003c0)=""/72, 0xfffffda1}], 0x6, 0x0, 0x0) 04:14:53 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x125c}}, 0x0) [ 1408.569501][ T8852] EXT4-fs (loop1): bad geometry: block count 251658368 exceeds size of device (66048 blocks) 04:14:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/locks\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/197, 0xc5}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) 04:14:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000001300000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 2: clone(0xd0040000, 0x0, 0x0, 0x0, 0x0) 04:14:53 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/216, 0xd8}], 0x1, 0x0, 0x0, 0x0) [ 1408.654150][ T8908] loop5: detected capacity change from 0 to 2048 [ 1408.673696][ T8908] EXT4-fs (loop5): blocks per group (266496) and clusters per group (16384) inconsistent 04:14:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000001204000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000340)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) signalfd4(r2, &(0x7f0000000100), 0x8, 0x0) [ 1408.707290][ T8918] loop1: detected capacity change from 0 to 264192 [ 1408.746406][ T8918] EXT4-fs (loop1): bad geometry: block count 268435584 exceeds size of device (66048 blocks) 04:14:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001106000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x307e, 0x0, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x7fbd60b2f35bd77f}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 04:14:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000320000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 2: pkey_mprotect(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x7, 0xffffffffffffffff) 04:14:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000001304000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 1408.824796][ T8953] loop5: detected capacity change from 0 to 2048 [ 1408.834831][ T8953] EXT4-fs (loop5): blocks per group (266752) and clusters per group (16384) inconsistent 04:14:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000360000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b801000013000100000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000010", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000009e21"], 0x1b8}}, 0x0) 04:14:53 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000001404000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x307e, 0x0, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x7fbd60b2f35bd77f}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 1408.913181][ T8971] loop1: detected capacity change from 0 to 264192 [ 1408.943622][ T8983] loop5: detected capacity change from 0 to 2048 [ 1408.951743][ T8971] EXT4-fs (loop1): bad geometry: block count 285212800 exceeds size of device (66048 blocks) [ 1408.958424][ T8983] EXT4-fs (loop5): blocks per group (267008) and clusters per group (16384) inconsistent 04:14:53 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000370000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:54 executing program 2: clone(0x8000, &(0x7f0000000040)="266a572ff365626e7575af78901d28246a752f50b1e43030271c944446fe4fef4299f8ffafdb6916014c60255492d7a8b3d6db1c350ea563ce73e3aefc07f4cc3abdeaec63a1fbcf9569113da6eff6", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="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") clone(0xd0040000, &(0x7f0000001180), 0x0, &(0x7f0000001240), &(0x7f0000001280)="629f60b845aa6787063897f994d751c9397266b592fce63612263371fc6b8b6ff44ebd966985929257e88ec4b75496855168095b85c806224ec4a81d8439477ba4e0d5f75a73bfe6b76bdc75b34cfd8f0158aa03c1eec59e1026466de4f9c3e11c580533fcc2b1098e0c65256ba9ad5613bd20fc94e5ee928916dde316b995345dbb8bca9fcaadb3e8916bd779ec3e9e3c4f01d0df9511e0") 04:14:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:54 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000380000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/timer_list\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}, {&(0x7f0000000100)=""/164, 0xa4}, {&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f0000000200)=""/220, 0xdc}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f00000003c0)=""/72, 0xfffffda1}], 0x6, 0x0, 0x0) 04:14:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000000)=0x307e, 0x0, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x7fbd60b2f35bd77f}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 1409.252264][ T9007] loop5: detected capacity change from 0 to 2048 [ 1409.289641][ T9007] EXT4-fs (loop5): blocks per group (267264) and clusters per group (16384) inconsistent 04:14:54 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000390000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1409.313477][ T9025] loop1: detected capacity change from 0 to 264192 [ 1409.322958][ T9025] EXT4-fs (loop1): bad geometry: block count 301990016 exceeds size of device (66048 blocks) [ 1409.418790][ T9025] loop1: detected capacity change from 0 to 264192 [ 1409.428602][ T9025] EXT4-fs (loop1): bad geometry: block count 301990016 exceeds size of device (66048 blocks) 04:14:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 04:14:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000001504000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:54 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x894c, 0x0) 04:14:54 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8981, 0x0) 04:14:54 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000003a0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:54 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000003b0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1409.983885][ T9061] loop1: detected capacity change from 0 to 264192 [ 1409.992810][ T9063] loop5: detected capacity change from 0 to 2048 [ 1410.003896][ T9061] EXT4-fs (loop1): bad geometry: block count 318767232 exceeds size of device (66048 blocks) [ 1410.014435][ T9063] EXT4-fs (loop5): blocks per group (267520) and clusters per group (16384) inconsistent 04:14:54 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0xc0045878, 0x0) 04:14:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x6, 0x0, 0x7, 0x800}]}) 04:14:54 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000003c0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000003f0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1410.258903][ T25] audit: type=1326 audit(1621052095.057:4399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9078 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 1410.314186][ T9092] loop1: detected capacity change from 0 to 264192 [ 1410.324452][ T9092] EXT4-fs (loop1): bad geometry: block count 335544448 exceeds size of device (66048 blocks) 04:14:55 executing program 0: r0 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)) 04:14:55 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x300}, 0x0) 04:14:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000031804000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000400000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000001400)) 04:14:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000800400000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:55 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000040)="260000002200473b77f8d20f58207a163dc6ef446fd46501050000000000000005006d20002b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r2 = getpid() sendmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(r0, &(0x7f0000000080)=@unspec, 0xc) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x800000015) 04:14:55 executing program 2: syz_io_uring_setup(0x0, 0xfffffffffffffffe, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) 04:14:55 executing program 3: clone(0x9d152f00, 0x0, 0x0, 0x0, 0x0) [ 1410.861422][ T9113] loop5: detected capacity change from 0 to 2048 [ 1410.879717][ T9116] loop1: detected capacity change from 0 to 264192 [ 1410.899047][ T9113] EXT4-fs (loop5): blocks per group (268291) and clusters per group (16384) inconsistent 04:14:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000420000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:55 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 04:14:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)={0x1eb0, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x3}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1e88, 0x3, 0x0, 0x1, [{0x12cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x48, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x3d, 0x1, "b257d40b4cb92d417aa9423586bb169b9a1fcf94c8703f03a678bbefc3db06fcd83f65800e69fbeb05604964d2704fbb1b69045314f693bb4e"}, @NFTA_DATA_VERDICT={0x4}]}, @NFTA_SET_ELEM_DATA={0x1280, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd9, 0x1, "7d324a004b25975d1560eb91834f2099d22262d080afa90061a4b1de7b0373eb9616f63abca9fedeb2fbc5874cf4bc3576047271180439efda6564631341ce1371a2d74682534227fcd25c0f6647a326cefa8be0334e9515eabfc3c990e396e00bdd09515837cbb9250916106c489427df29ca3c78ed87fd8fe4547691dce00a81ac08d4824407cf5c5fe0daab1d4259c65dae780bc5af00e76a1bad2f8a6b2045d027f984fb03a5cedf8e283e1a9f3eb2c94bdb7d71f9b27d51295f917a42e58a45716546fcc487b37c2474b801794a8911965be8"}, @NFTA_DATA_VALUE={0x55, 0x1, "2d44c0f94a7386b1aca37cd45fcff00050ccff74e1115b2b219d9ffb044f45a92f1b4950e653d227176638537f18c87cfe48e4e29dd685451a12171e27daf1ea8632da5c2ef2f25c074734f53ac9aebc8a"}, @NFTA_DATA_VALUE={0x19, 0x1, "b55340c01312e32ae71d14241f5ef029df0957645e"}, @NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x75, 0x1, "f2c9540585deaccffedc850dc15fc274eb357c573faedfe510e2c6e7e5f61583ceffa43d59d70221c7c2be7a71f4a1fef66a8c8b196ecac5b44322bf5d4e4f9e01f22595208e969a06fca3da6fa6c9620b8cca41260b9455427dd46926cedc9fac18292f19b154ae60ce5b760f4752188f"}, @NFTA_DATA_VALUE={0x1001, 0x1, "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"}, @NFTA_DATA_VALUE={0x55, 0x1, "6ca7cb85114ecce8cf0455ff82a4b7e4273284438d37ad413183cf214f460f49cfb93a3abc5fc54229c0d9aab85b695c19c83b2e0b50e21f16cce50e1f744adba9aad940ca07be08cff90b2bada09a419d"}]}]}, {0x3cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x2e4, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xcd, 0x1, "9c3db9a9375a03e08fc295f7a42bcaa200afbf7c809394e25b0be7b144c33071b0ae00efcb00e11e116e8911783c4ed50730cd4663d8696891e6b6d3f4980088ba59253200ac5712f44bfe05f1eac424712ae70a8ccad51418bd2cb154db11ccf86531cce7135850e78609d1a4e5b722401ae2f075019928004fb875c6b78f02d68691eeb2fa390f74a6405c8300b09aa8b0542405f9e80567db2fc6ccefbe0e8b71b67b592e9ccdfe85411a09d5b6fbf68d03c350e611c22988f60e22ab5ca616cd5052173863d678"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x49, 0x1, "511cdc6f108445e7421a1080ed3bed1ae95616e50404db1be3c2815107a083cbb1f27d95a9901886d3011ab9397f7b7388cedd917003b95027e19facc78ca3c64612a0317d"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x4d, 0x1, "58c87df553139a922a015a2e2eadaed2fc4f8a56028c34bc685e2309e68f5eace4fef2d6ffd2d005f40514eb04f2a5bfe293b449244f1380083f2c60ad0ac3d22903bdb55ff4c8a2f0"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xc5, 0x1, "95545c93e45b01ac3a9b37515128eddb1ef2cd626ba857df899ae6c5bfc865146d715e768ec3263687aa3c3208909ad65abe056e5243d7d351f2308b5d83155247b7a2941ec0b086cf9e5e4755ea8771367c0610195e3a4dce3c155f76ee1a1a52af599fbed6067bf3fb2908edb0ae5f7221c317c23e75ec5dde506da8c0f6144a52a782edc31009bab9ad944e86743ce3bd572a23eb04a1cc36f5772f24d5da01d33a69ec556d848b76b5874c49ac0a6da53a40d9b7c0fe0fd02ef5a7798465f2"}]}, @NFTA_SET_ELEM_KEY={0x2c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_USERDATA={0x81, 0x6, 0x1, 0x0, "a84d6b210e9911a87649344cd0b6c28029ff327bb540260823e36822b51d497c6b80687fa809711c6f7ce2bec476aff19a9f2806e819445440055c7f291c3318ba94b0246b7bce99e1fef2116cac7c9a5a84986c043de2c461adb88799e27f29e37f34115626e0632907353b066f84c3dae197d7bdaa59f450322a2414"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x50, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x4c, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}]}, {0x79c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x798, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc9, 0x1, "e06887a77cd2a2728f678b11997f8cf82d3974add1a689320f26a92f86a9fb05f4a5df7ca02ea24696381daea7194f5a8f36cf57ca35c1b78a8f0c7df5e757b61eb2383c7151e404171f11e2aa5bbb2d7466b8d0ce9c6bba9f63545072827aa1c0bf19a8abdb7c4655e48c5c77524fa451087d46941fcfbd5565d09f80a086ea048bd7096c1a1bd616ee4578977993b29432abf9628cd40ac53af4caaaf02f92668484402080a3bc3dee3c3487292a673f45c4e49668b829f037c88749940939e85696ee8f"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0xed, 0x1, "1b008f21879dfc6f02cab1e5c4f4a892ed5243b3cfd3cd0208ce5e4b55feb435d50c33f3882abfd914967e3eb9ccd2e4f973bca2d57eda88ab0f2110a4d64f1b3abd35c4c12d4730a4211909b5527ba806c5b5753bf4d81701320da9dcbc4b206f284b3097273f15388930762847975d65365642f6316f06480efbf9259ebc40686613cce91658fe5ad591c3220567d1317d7810d510e35d89b408a255a33380f65771ecc32447325dc25a553e0a6186cd4a216875ee4e1a7bf9262a1a4bc67e3e18f045eb1e8bd7d03a279996d7e3d99f487c026cf60cb498763fd12decb9123a1622a0c8c7bee560"}, @NFTA_DATA_VALUE={0x5a5, 0x1, "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"}]}]}]}]}, 0x1eb0}}, 0x0) 04:14:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000001f04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1410.914067][ T9116] EXT4-fs (loop1): bad geometry: block count 352321664 exceeds size of device (66048 blocks) 04:14:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000480000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:55 executing program 2: clone(0x2100, 0x0, 0x0, 0x0, 0x0) 04:14:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000004c0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1411.022447][ T9145] loop1: detected capacity change from 0 to 264192 [ 1411.043451][ T9144] loop5: detected capacity change from 0 to 2048 04:14:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000002004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8904, 0x0) 04:14:55 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c000000140001000000000000b7bae46d"], 0x4c}}, 0x0) 04:14:55 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000600000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1411.063827][ T9144] EXT4-fs (loop5): blocks per group (270080) and clusters per group (16384) inconsistent [ 1411.084890][ T9145] EXT4-fs (loop1): bad geometry: block count 369098880 exceeds size of device (66048 blocks) 04:14:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001706000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:56 executing program 2: clone(0x1000800, 0x0, 0x0, 0x0, 0x0) 04:14:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf250200000008000100000000003c"], 0xa0}}, 0x0) 04:14:56 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000580)={0xfffffffffffffffe, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x7}, 0x0) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000001620000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1411.166952][ T9145] loop1: detected capacity change from 0 to 264192 [ 1411.185804][ T9173] loop5: detected capacity change from 0 to 2048 [ 1411.197669][ T9145] EXT4-fs (loop1): bad geometry: block count 369098880 exceeds size of device (66048 blocks) 04:14:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf250200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32], 0xa0}, 0x1, 0x0, 0x0, 0x847}, 0x0) 04:14:56 executing program 0: syz_genetlink_get_family_id$mptcp(&(0x7f00000006c0), 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x6, 0xdb, 0x7, 0x800}]}) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000680000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1411.246462][ T9173] EXT4-fs (loop5): blocks per group (270336) and clusters per group (16384) inconsistent 04:14:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000102004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000000)={0xfffffffffffffffe, 0x0, &(0x7f0000000040)={0x0, 0x47}}, 0x0) 04:14:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)={0x138, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x110, 0x3, 0x0, 0x1, [{0x10c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x48, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x3d, 0x1, "b257d40b4cb92d417aa9423586bb169b9a1fcf94c8703f03a678bbefc3db06fcd83f65800e69fbeb05604964d2704fbb1b69045314f693bb4e"}, @NFTA_DATA_VERDICT={0x4}]}, @NFTA_SET_ELEM_DATA={0xc0, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xb9, 0x1, "7d324a004b25975d1560eb91834f2099d22262d080afa90061a4b1de7b0373eb9616f63abca9fedeb2fbc5874cf4bc3576047271180439efda6564631341ce1371a2d74682534227fcd25c0f6647a326cefa8be0334e9515eabfc3c990e396e00bdd09515837cbb9250916106c489427df29ca3c78ed87fd8fe4547691dce00a81ac08d4824407cf5c5fe0daab1d4259c65dae780bc5af00e76a1bad2f8a6b2045d027f984fb03a5cedf8e283e1a9f3eb2c94bdb7d"}]}]}]}]}, 0x138}}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x10002) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000006c0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1411.296497][ T9196] loop1: detected capacity change from 0 to 264192 [ 1411.309478][ T9196] EXT4-fs (loop1): bad geometry: block count 385876096 exceeds size of device (66048 blocks) [ 1411.361083][ T25] audit: type=1326 audit(1621052096.168:4400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9206 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 04:14:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001806000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)={0x14, 0xd, 0x25, 0x5}, 0x14}}, 0x0) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000740000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000002204000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16, @ANYBLOB="db"], 0x48}}, 0x0) 04:14:56 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6d, 0x78]}, 0x30}]}) [ 1411.419559][ T9196] loop1: detected capacity change from 0 to 264192 [ 1411.423804][ T9225] loop5: detected capacity change from 0 to 2048 [ 1411.432923][ T9196] EXT4-fs (loop1): bad geometry: block count 385876096 exceeds size of device (66048 blocks) [ 1411.444773][ T9225] EXT4-fs (loop5): blocks per group (270352) and clusters per group (16384) inconsistent 04:14:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)={0x1eb0, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x1e94, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1e88, 0x3, 0x0, 0x1, [{0x12cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x48, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x3d, 0x1, "b257d40b4cb92d417aa9423586bb169b9a1fcf94c8703f03a678bbefc3db06fcd83f65800e69fbeb05604964d2704fbb1b69045314f693bb4e"}, @NFTA_DATA_VERDICT={0x4}]}, @NFTA_SET_ELEM_DATA={0x1280, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd9, 0x1, "7d324a004b25975d1560eb91834f2099d22262d080afa90061a4b1de7b0373eb9616f63abca9fedeb2fbc5874cf4bc3576047271180439efda6564631341ce1371a2d74682534227fcd25c0f6647a326cefa8be0334e9515eabfc3c990e396e00bdd09515837cbb9250916106c489427df29ca3c78ed87fd8fe4547691dce00a81ac08d4824407cf5c5fe0daab1d4259c65dae780bc5af00e76a1bad2f8a6b2045d027f984fb03a5cedf8e283e1a9f3eb2c94bdb7d71f9b27d51295f917a42e58a45716546fcc487b37c2474b801794a8911965be8"}, @NFTA_DATA_VALUE={0x55, 0x1, "2d44c0f94a7386b1aca37cd45fcff00050ccff74e1115b2b219d9ffb044f45a92f1b4950e653d227176638537f18c87cfe48e4e29dd685451a12171e27daf1ea8632da5c2ef2f25c074734f53ac9aebc8a"}, @NFTA_DATA_VALUE={0x19, 0x1, "b55340c01312e32ae71d14241f5ef029df0957645e"}, @NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x75, 0x1, "f2c9540585deaccffedc850dc15fc274eb357c573faedfe510e2c6e7e5f61583ceffa43d59d70221c7c2be7a71f4a1fef66a8c8b196ecac5b44322bf5d4e4f9e01f22595208e969a06fca3da6fa6c9620b8cca41260b9455427dd46926cedc9fac18292f19b154ae60ce5b760f4752188f"}, @NFTA_DATA_VALUE={0x1001, 0x1, "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"}, @NFTA_DATA_VALUE={0x55, 0x1, "6ca7cb85114ecce8cf0455ff82a4b7e4273284438d37ad413183cf214f460f49cfb93a3abc5fc54229c0d9aab85b695c19c83b2e0b50e21f16cce50e1f744adba9aad940ca07be08cff90b2bada09a419d"}]}]}, {0x3cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x2e4, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xcd, 0x1, "9c3db9a9375a03e08fc295f7a42bcaa200afbf7c809394e25b0be7b144c33071b0ae00efcb00e11e116e8911783c4ed50730cd4663d8696891e6b6d3f4980088ba59253200ac5712f44bfe05f1eac424712ae70a8ccad51418bd2cb154db11ccf86531cce7135850e78609d1a4e5b722401ae2f075019928004fb875c6b78f02d68691eeb2fa390f74a6405c8300b09aa8b0542405f9e80567db2fc6ccefbe0e8b71b67b592e9ccdfe85411a09d5b6fbf68d03c350e611c22988f60e22ab5ca616cd5052173863d678"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x49, 0x1, "511cdc6f108445e7421a1080ed3bed1ae95616e50404db1be3c2815107a083cbb1f27d95a9901886d3011ab9397f7b7388cedd917003b95027e19facc78ca3c64612a0317d"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x4d, 0x1, "58c87df553139a922a015a2e2eadaed2fc4f8a56028c34bc685e2309e68f5eace4fef2d6ffd2d005f40514eb04f2a5bfe293b449244f1380083f2c60ad0ac3d22903bdb55ff4c8a2f0"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xc5, 0x1, "95545c93e45b01ac3a9b37515128eddb1ef2cd626ba857df899ae6c5bfc865146d715e768ec3263687aa3c3208909ad65abe056e5243d7d351f2308b5d83155247b7a2941ec0b086cf9e5e4755ea8771367c0610195e3a4dce3c155f76ee1a1a52af599fbed6067bf3fb2908edb0ae5f7221c317c23e75ec5dde506da8c0f6144a52a782edc31009bab9ad944e86743ce3bd572a23eb04a1cc36f5772f24d5da01d33a69ec556d848b76b5874c49ac0a6da53a40d9b7c0fe0fd02ef5a7798465f2"}]}, @NFTA_SET_ELEM_KEY={0x2c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_USERDATA={0x81, 0x6, 0x1, 0x0, "a84d6b210e9911a87649344cd0b6c28029ff327bb540260823e36822b51d497c6b80687fa809711c6f7ce2bec476aff19a9f2806e819445440055c7f291c3318ba94b0246b7bce99e1fef2116cac7c9a5a84986c043de2c461adb88799e27f29e37f34115626e0632907353b066f84c3dae197d7bdaa59f450322a2414"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x50, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x4c, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}]}, {0x79c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x798, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc9, 0x1, "e06887a77cd2a2728f678b11997f8cf82d3974add1a689320f26a92f86a9fb05f4a5df7ca02ea24696381daea7194f5a8f36cf57ca35c1b78a8f0c7df5e757b61eb2383c7151e404171f11e2aa5bbb2d7466b8d0ce9c6bba9f63545072827aa1c0bf19a8abdb7c4655e48c5c77524fa451087d46941fcfbd5565d09f80a086ea048bd7096c1a1bd616ee4578977993b29432abf9628cd40ac53af4caaaf02f92668484402080a3bc3dee3c3487292a673f45c4e49668b829f037c88749940939e85696ee8f"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0xed, 0x1, "1b008f21879dfc6f02cab1e5c4f4a892ed5243b3cfd3cd0208ce5e4b55feb435d50c33f3882abfd914967e3eb9ccd2e4f973bca2d57eda88ab0f2110a4d64f1b3abd35c4c12d4730a4211909b5527ba806c5b5753bf4d81701320da9dcbc4b206f284b3097273f15388930762847975d65365642f6316f06480efbf9259ebc40686613cce91658fe5ad591c3220567d1317d7810d510e35d89b408a255a33380f65771ecc32447325dc25a553e0a6186cd4a216875ee4e1a7bf9262a1a4bc67e3e18f045eb1e8bd7d03a279996d7e3d99f487c026cf60cb498763fd12decb9123a1622a0c8c7bee560"}, @NFTA_DATA_VALUE={0x5a5, 0x1, "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"}]}]}]}]}, 0x1eb0}}, 0x0) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000760000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:56 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b311fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e919f130dec95128ce7ec033dc0a380543bfc99320b", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 04:14:56 executing program 0: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x248, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x28, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x70, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x120, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x3c, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1904ebb8}]}]}]}, 0x248}}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/timer_list\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500), 0x6, 0x0, 0x0) [ 1411.554769][ T9249] tmpfs: Bad value for 'nr_blocks' [ 1411.555152][ T9253] loop5: detected capacity change from 0 to 2048 [ 1411.570491][ T9253] EXT4-fs (loop5): blocks per group (270848) and clusters per group (16384) inconsistent [ 1411.587767][ T9256] tmpfs: Bad value for 'nr_blocks' [ 1411.589924][ T9251] loop1: detected capacity change from 0 to 264192 04:14:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000000a00)) fchdir(r1) r2 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_mreqn(r2, 0x0, 0x20, 0x0, &(0x7f0000000a00)) ftruncate(r2, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201540000000a000000ff45ac0080ffffff0500e931190000000000000680000000630000000900000087771f72003007000500000000000000008000ca55aa", 0x40, 0x1c0}]) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x8}], 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f6c64616c6cef63376e6f6c6f61642c646566636f6e746578743d7374616666e248af635f752c646ed2eff452014216636f6e6669"]) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x204400, 0x2) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8100, 0x40) pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000280)={r4, r5, 0x1}) 04:14:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000002504000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1411.610465][ T9251] EXT4-fs (loop1): bad geometry: block count 402653312 exceeds size of device (66048 blocks) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000770000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001906000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:56 executing program 0: clone(0x21001100, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)="d1") 04:14:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f00000008c0)={0x0, 0x0}) 04:14:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000780000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1411.667958][ T9251] loop1: detected capacity change from 0 to 264192 [ 1411.676534][ T9251] EXT4-fs (loop1): bad geometry: block count 402653312 exceeds size of device (66048 blocks) 04:14:56 executing program 0: clone(0x400, 0x0, 0x0, 0x0, 0x0) 04:14:56 executing program 3: syz_io_uring_setup(0x30, &(0x7f0000000140), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x65c8, &(0x7f00000021c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000002400), &(0x7f0000002240)) 04:14:56 executing program 0: io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001380)=[{0x0, 0x0, 0x80000000}]) [ 1411.761160][ T9288] loop5: detected capacity change from 0 to 2048 [ 1411.775662][ T9288] EXT4-fs (loop5): blocks per group (271616) and clusters per group (16384) inconsistent 04:14:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000790000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000002e04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1411.815388][ T9307] loop1: detected capacity change from 0 to 264192 [ 1411.845371][ T9307] EXT4-fs (loop1): bad geometry: block count 419430528 exceeds size of device (66048 blocks) 04:14:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001a06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:56 executing program 0: r0 = accept(0xffffffffffffffff, &(0x7f0000000580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x80) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800028}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14, 0x7, 0x1, 0x404, 0x0, 0x0, {0x2, 0x0, 0x9}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x884}, 0x50) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sysvipc/msg\x00', 0x0, 0x0) keyctl$link(0x2, 0x0, 0xfffffffffffffff8) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780), r1) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x38, r2, 0x1, 0x70bd25, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x1, 0x3]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x40848}, 0xc000) preadv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}, {&(0x7f0000000100)=""/164, 0xa4}, {&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f0000000200)=""/220, 0xdc}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f00000003c0)=""/72, 0xfffffda1}], 0x6, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/timer_list\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/mdstat\x00', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000006c0), r3) r4 = add_key$keyring(&(0x7f0000000900), &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r4, 0xfffffffffffffffb) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r3) recvmsg(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000980)=""/31, 0x1f}, {&(0x7f00000009c0)=""/176, 0xb0}, {&(0x7f0000000a80)=""/34, 0x22}], 0x4, &(0x7f0000000b00)=""/139, 0x8b}, 0x2) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000008c0)={0x3, &(0x7f0000000880)=[{0x6, 0xdb, 0x7, 0x800}, {0xfff, 0x13, 0x6, 0x61}, {0x0, 0x0, 0xf7, 0x5}]}) ioctl$FIONCLEX(r5, 0x5450) 04:14:56 executing program 3: r0 = socket(0x11, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r0) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000007a0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000003204000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1411.956333][ T9339] loop5: detected capacity change from 0 to 2048 [ 1411.968393][ T9339] EXT4-fs (loop5): blocks per group (273920) and clusters per group (16384) inconsistent 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000017a0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:56 executing program 3: clone(0x21001100, 0x0, 0x0, 0x0, 0x0) 04:14:56 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getitimer(0x2, &(0x7f0000000240)) 04:14:56 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000017b0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1412.052249][ T9354] loop1: detected capacity change from 0 to 264192 [ 1412.077783][ T9354] EXT4-fs (loop1): bad geometry: block count 436207744 exceeds size of device (66048 blocks) 04:14:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001b06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:56 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}], 0x1, 0x0, 0x0) 04:14:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 0: socket(0x10, 0x2, 0x8) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000017c0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000003f04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1412.128900][ T9373] loop5: detected capacity change from 0 to 2048 [ 1412.155484][ T9373] EXT4-fs (loop5): blocks per group (274944) and clusters per group (16384) inconsistent 04:14:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000001380)=[{0x0}, {0x0, 0x0, 0x80000000}]) 04:14:57 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000017d0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001c06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:57 executing program 2: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf250200000008", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32], 0xa0}, 0x1, 0x0, 0x0, 0x847}, 0x4044890) [ 1412.274009][ T9395] loop1: detected capacity change from 0 to 264192 [ 1412.290694][ T9395] EXT4-fs (loop1): bad geometry: block count 452984960 exceeds size of device (66048 blocks) [ 1412.316634][ T9406] loop5: detected capacity change from 0 to 2048 04:14:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x16}]}) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000017e0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 2: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1412.337883][ T9406] EXT4-fs (loop5): blocks per group (278272) and clusters per group (16384) inconsistent 04:14:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000004004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000017f0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000340)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 1412.394760][ T25] audit: type=1326 audit(1621052097.198:4401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9421 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 04:14:57 executing program 2: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 0: r0 = eventfd(0x0) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) 04:14:57 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1412.475635][ T9441] loop1: detected capacity change from 0 to 264192 [ 1412.489786][ T9441] EXT4-fs (loop1): bad geometry: block count 469762176 exceeds size of device (66048 blocks) [ 1412.535672][ T9446] loop5: detected capacity change from 0 to 2048 [ 1412.552500][ T9446] EXT4-fs (loop5): blocks per group (278528) and clusters per group (16384) inconsistent 04:14:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001d06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000002800000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 0: clone(0x49040100, 0x0, 0x0, 0x0, 0x0) 04:14:57 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000008004004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 3: r0 = syz_io_uring_setup(0x30, &(0x7f0000000140), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x10000000) 04:14:57 executing program 0: r0 = socket(0x2, 0x2, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x8000000) 04:14:57 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1412.593301][ T9441] loop1: detected capacity change from 0 to 264192 [ 1412.615546][ T9441] EXT4-fs (loop1): bad geometry: block count 469762176 exceeds size of device (66048 blocks) 04:14:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000002810000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1412.684996][ T9481] loop5: detected capacity change from 0 to 2048 04:14:57 executing program 0: syz_genetlink_get_family_id$mptcp(&(0x7f00000006c0), 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{}]}) 04:14:57 executing program 3: r0 = syz_io_uring_setup(0x3dc4, &(0x7f0000000040)={0x0, 0x0, 0x1}, &(0x7f0000035000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000007c0)=0x0, &(0x7f0000000000)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xbf, 0x0, 0x0, 0x0, 0x0) [ 1412.727028][ T9481] EXT4-fs (loop5): Invalid log cluster size: 134217733 [ 1412.732737][ T9498] loop1: detected capacity change from 0 to 264192 [ 1412.743763][ T9498] EXT4-fs (loop1): bad geometry: block count 486539392 exceeds size of device (66048 blocks) 04:14:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000001e06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000002820000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000004204000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x80108906, 0x0) 04:14:57 executing program 3: pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0xffffffffffffffff) [ 1412.806840][ T9498] loop1: detected capacity change from 0 to 264192 [ 1412.841025][ T9498] EXT4-fs (loop1): bad geometry: block count 486539392 exceeds size of device (66048 blocks) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000002830000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000580)={0xfffffffffffffffe, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x700}, 0x0) 04:14:57 executing program 3: r0 = syz_io_uring_setup(0x30, &(0x7f0000000140), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x20111, r0, 0x10000000) [ 1412.912725][ T9535] loop5: detected capacity change from 0 to 2048 [ 1412.944635][ T9535] EXT4-fs (loop5): blocks per group (279040) and clusters per group (16384) inconsistent 04:14:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000002840000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1412.968887][ T9549] loop1: detected capacity change from 0 to 264192 [ 1412.986247][ T9549] EXT4-fs (loop1): bad geometry: block count 503316608 exceeds size of device (66048 blocks) 04:14:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000004804000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_elf32(r0, 0x0, 0x0) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000002850000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/timer_list\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) 04:14:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002106000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:57 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000003860000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:57 executing program 0: wait4(0x0, 0x0, 0x41000000, 0x0) [ 1413.085401][ T9549] loop1: detected capacity change from 0 to 264192 [ 1413.093173][ T9549] EXT4-fs (loop1): bad geometry: block count 503316608 exceeds size of device (66048 blocks) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000003870000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) 04:14:58 executing program 0: clone(0x1ea08080, 0x0, 0x0, 0x0, &(0x7f0000001380)="442fac826120a19f0ff86652757357533ca18bf27df1f209f8557e5838a5fcbafff15ebc3c34e71309b730d7afdf7ba314a3736f99c21cec1f92e8e8724c777c568daee7309ea22af79d9889eedde34d1fa77d69387d53a9d4cbb363386878") [ 1413.170312][ T9583] loop5: detected capacity change from 0 to 2048 [ 1413.179310][ T9583] EXT4-fs (loop5): blocks per group (280576) and clusters per group (16384) inconsistent [ 1413.201059][ T9596] loop1: detected capacity change from 0 to 264192 04:14:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000004c04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000003880000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1413.216552][ T9596] EXT4-fs (loop1): bad geometry: block count 553648256 exceeds size of device (66048 blocks) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000003890000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1413.341032][ T9623] loop5: detected capacity change from 0 to 2048 [ 1413.368012][ T9596] loop1: detected capacity change from 0 to 264192 [ 1413.378876][ T9623] EXT4-fs (loop5): blocks per group (281600) and clusters per group (16384) inconsistent 04:14:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:58 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xfffffffffffffe81) 04:14:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) rmdir(&(0x7f0000000380)='./file0/file0\x00') mkdir(&(0x7f0000000400)='./file0/file0\x00', 0x0) 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffff8c0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000006004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1413.389326][ T9596] EXT4-fs (loop1): bad geometry: block count 553648256 exceeds size of device (66048 blocks) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffff970000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000580)={0xfffffffffffffffe, 0xffff0000, &(0x7f0000000540)={0x0}}, 0x0) [ 1413.501391][ T9660] loop5: detected capacity change from 0 to 2048 [ 1413.516768][ T9660] EXT4-fs (loop5): blocks per group (286720) and clusters per group (16384) inconsistent [ 1413.533851][ T9663] loop1: detected capacity change from 0 to 264192 [ 1413.541560][ T9672] new mount options do not match the existing superblock, will be ignored 04:14:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000006704000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1413.553862][ T9663] EXT4-fs (loop1): bad geometry: block count 570425472 exceeds size of device (66048 blocks) 04:14:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5450, 0x0) 04:14:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)={0x1eb0, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x11}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1e88, 0x3, 0x0, 0x1, [{0x12cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x48, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x3d, 0x1, "b257d40b4cb92d417aa9423586bb169b9a1fcf94c8703f03a678bbefc3db06fcd83f65800e69fbeb05604964d2704fbb1b69045314f693bb4e"}, @NFTA_DATA_VERDICT={0x4}]}, @NFTA_SET_ELEM_DATA={0x1280, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd9, 0x1, "7d324a004b25975d1560eb91834f2099d22262d080afa90061a4b1de7b0373eb9616f63abca9fedeb2fbc5874cf4bc3576047271180439efda6564631341ce1371a2d74682534227fcd25c0f6647a326cefa8be0334e9515eabfc3c990e396e00bdd09515837cbb9250916106c489427df29ca3c78ed87fd8fe4547691dce00a81ac08d4824407cf5c5fe0daab1d4259c65dae780bc5af00e76a1bad2f8a6b2045d027f984fb03a5cedf8e283e1a9f3eb2c94bdb7d71f9b27d51295f917a42e58a45716546fcc487b37c2474b801794a8911965be8"}, @NFTA_DATA_VALUE={0x55, 0x1, "2d44c0f94a7386b1aca37cd45fcff00050ccff74e1115b2b219d9ffb044f45a92f1b4950e653d227176638537f18c87cfe48e4e29dd685451a12171e27daf1ea8632da5c2ef2f25c074734f53ac9aebc8a"}, @NFTA_DATA_VALUE={0x19, 0x1, "b55340c01312e32ae71d14241f5ef029df0957645e"}, @NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x75, 0x1, "f2c9540585deaccffedc850dc15fc274eb357c573faedfe510e2c6e7e5f61583ceffa43d59d70221c7c2be7a71f4a1fef66a8c8b196ecac5b44322bf5d4e4f9e01f22595208e969a06fca3da6fa6c9620b8cca41260b9455427dd46926cedc9fac18292f19b154ae60ce5b760f4752188f"}, @NFTA_DATA_VALUE={0x1001, 0x1, "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"}, @NFTA_DATA_VALUE={0x55, 0x1, "6ca7cb85114ecce8cf0455ff82a4b7e4273284438d37ad413183cf214f460f49cfb93a3abc5fc54229c0d9aab85b695c19c83b2e0b50e21f16cce50e1f744adba9aad940ca07be08cff90b2bada09a419d"}]}]}, {0x3cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x2e4, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xcd, 0x1, "9c3db9a9375a03e08fc295f7a42bcaa200afbf7c809394e25b0be7b144c33071b0ae00efcb00e11e116e8911783c4ed50730cd4663d8696891e6b6d3f4980088ba59253200ac5712f44bfe05f1eac424712ae70a8ccad51418bd2cb154db11ccf86531cce7135850e78609d1a4e5b722401ae2f075019928004fb875c6b78f02d68691eeb2fa390f74a6405c8300b09aa8b0542405f9e80567db2fc6ccefbe0e8b71b67b592e9ccdfe85411a09d5b6fbf68d03c350e611c22988f60e22ab5ca616cd5052173863d678"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x49, 0x1, "511cdc6f108445e7421a1080ed3bed1ae95616e50404db1be3c2815107a083cbb1f27d95a9901886d3011ab9397f7b7388cedd917003b95027e19facc78ca3c64612a0317d"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x4d, 0x1, "58c87df553139a922a015a2e2eadaed2fc4f8a56028c34bc685e2309e68f5eace4fef2d6ffd2d005f40514eb04f2a5bfe293b449244f1380083f2c60ad0ac3d22903bdb55ff4c8a2f0"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xc5, 0x1, "95545c93e45b01ac3a9b37515128eddb1ef2cd626ba857df899ae6c5bfc865146d715e768ec3263687aa3c3208909ad65abe056e5243d7d351f2308b5d83155247b7a2941ec0b086cf9e5e4755ea8771367c0610195e3a4dce3c155f76ee1a1a52af599fbed6067bf3fb2908edb0ae5f7221c317c23e75ec5dde506da8c0f6144a52a782edc31009bab9ad944e86743ce3bd572a23eb04a1cc36f5772f24d5da01d33a69ec556d848b76b5874c49ac0a6da53a40d9b7c0fe0fd02ef5a7798465f2"}]}, @NFTA_SET_ELEM_KEY={0x2c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_USERDATA={0x81, 0x6, 0x1, 0x0, "a84d6b210e9911a87649344cd0b6c28029ff327bb540260823e36822b51d497c6b80687fa809711c6f7ce2bec476aff19a9f2806e819445440055c7f291c3318ba94b0246b7bce99e1fef2116cac7c9a5a84986c043de2c461adb88799e27f29e37f34115626e0632907353b066f84c3dae197d7bdaa59f450322a2414"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x50, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x4c, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}]}, {0x79c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x798, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc9, 0x1, "e06887a77cd2a2728f678b11997f8cf82d3974add1a689320f26a92f86a9fb05f4a5df7ca02ea24696381daea7194f5a8f36cf57ca35c1b78a8f0c7df5e757b61eb2383c7151e404171f11e2aa5bbb2d7466b8d0ce9c6bba9f63545072827aa1c0bf19a8abdb7c4655e48c5c77524fa451087d46941fcfbd5565d09f80a086ea048bd7096c1a1bd616ee4578977993b29432abf9628cd40ac53af4caaaf02f92668484402080a3bc3dee3c3487292a673f45c4e49668b829f037c88749940939e85696ee8f"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0xed, 0x1, "1b008f21879dfc6f02cab1e5c4f4a892ed5243b3cfd3cd0208ce5e4b55feb435d50c33f3882abfd914967e3eb9ccd2e4f973bca2d57eda88ab0f2110a4d64f1b3abd35c4c12d4730a4211909b5527ba806c5b5753bf4d81701320da9dcbc4b206f284b3097273f15388930762847975d65365642f6316f06480efbf9259ebc40686613cce91658fe5ad591c3220567d1317d7810d510e35d89b408a255a33380f65771ecc32447325dc25a553e0a6186cd4a216875ee4e1a7bf9262a1a4bc67e3e18f045eb1e8bd7d03a279996d7e3d99f487c026cf60cb498763fd12decb9123a1622a0c8c7bee560"}, @NFTA_DATA_VALUE={0x5a5, 0x1, "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"}]}]}]}]}, 0x1eb0}}, 0x0) 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000009d0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000009e0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000006804000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1413.644447][ T9687] loop5: detected capacity change from 0 to 2048 [ 1413.675522][ T9687] EXT4-fs (loop5): blocks per group (288512) and clusters per group (16384) inconsistent 04:14:58 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x4c, 0x12, 0x1}, 0x4c}}, 0x0) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:58 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x6}]}) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) [ 1413.724235][ T9698] loop1: detected capacity change from 0 to 264192 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000029e0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/vmstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}, {&(0x7f0000000100)=""/164, 0xa4}, {&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f0000000200)=""/220, 0xdc}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f00000003c0)=""/72, 0xfffffda1}], 0x6, 0x0, 0x0) [ 1413.782654][ T9698] EXT4-fs (loop1): bad geometry: block count 587202688 exceeds size of device (66048 blocks) [ 1413.808402][ T9717] loop5: detected capacity change from 0 to 2048 [ 1413.832456][ T9717] EXT4-fs (loop5): blocks per group (288768) and clusters per group (16384) inconsistent [ 1413.857566][ T25] audit: type=1326 audit(1621052098.658:4402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9729 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 04:14:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000006904000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000009f0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) clone(0xd0040000, &(0x7f0000001180), 0x0, 0x0, 0x0) [ 1413.916590][ T9698] loop1: detected capacity change from 0 to 264192 [ 1413.932983][ T9698] EXT4-fs (loop1): bad geometry: block count 587202688 exceeds size of device (66048 blocks) 04:14:58 executing program 0: io_setup(0x4, &(0x7f0000000340)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) unshare(0x8000400) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) signalfd4(r2, &(0x7f0000000100), 0x8, 0x0) 04:14:58 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000001ab0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000006a04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1413.997061][ T9756] loop5: detected capacity change from 0 to 2048 [ 1414.011175][ T9756] EXT4-fs (loop5): blocks per group (289024) and clusters per group (16384) inconsistent [ 1414.030999][ T9765] loop1: detected capacity change from 0 to 264192 [ 1414.046109][ T9765] EXT4-fs (loop1): bad geometry: block count 603979904 exceeds size of device (66048 blocks) [ 1414.127760][ T9791] loop5: detected capacity change from 0 to 2048 [ 1414.138006][ T9791] EXT4-fs (loop5): blocks per group (289280) and clusters per group (16384) inconsistent 04:14:59 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x4c, 0x12, 0x1, 0x0, 0x0, {0x2}}, 0x4c}}, 0x0) 04:14:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000edc00000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x70, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x70}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:59 executing program 0: clone(0x1108000, 0x0, 0x0, 0x0, 0x0) 04:14:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000006b04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1414.660422][ T25] audit: type=1326 audit(1621052099.468:4403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9729 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 04:14:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x70, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x70}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000003c10000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:59 executing program 0: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) [ 1414.747128][ T9807] loop1: detected capacity change from 0 to 264192 [ 1414.773795][ T9811] loop5: detected capacity change from 0 to 2048 [ 1414.780796][ T9807] EXT4-fs (loop1): bad geometry: block count 620757120 exceeds size of device (66048 blocks) 04:14:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000006c04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:59 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 04:14:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x70, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x70}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1414.801117][ T9811] EXT4-fs (loop5): blocks per group (289536) and clusters per group (16384) inconsistent 04:14:59 executing program 3: r0 = syz_io_uring_setup(0x30, &(0x7f0000000140), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 04:14:59 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8903, 0x0) 04:14:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:14:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00001dc50000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000007404000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x54, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x54}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00001dc80000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:14:59 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x4c, 0x14, 0x1}, 0x4c}}, 0x0) [ 1414.920140][ T9838] loop5: detected capacity change from 0 to 2048 [ 1414.935964][ T9838] EXT4-fs (loop5): blocks per group (289792) and clusters per group (16384) inconsistent 04:14:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000040)={0xfffffffffffffffe, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 04:14:59 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffff5ad00000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1414.990352][ T9854] loop1: detected capacity change from 0 to 264192 [ 1415.003935][ T9854] EXT4-fs (loop1): bad geometry: block count 637534336 exceeds size of device (66048 blocks) 04:14:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x54, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x54}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:59 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sysvipc/shm\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}, {&(0x7f0000000100)=""/164, 0xa4}], 0x2, 0x0, 0x0) [ 1415.042604][ T9865] loop5: detected capacity change from 0 to 2048 04:14:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x54, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x54}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:14:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000000)=[{0x6}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 1415.085410][ T9865] EXT4-fs (loop5): blocks per group (291840) and clusters per group (16384) inconsistent [ 1415.113067][ T9854] loop1: detected capacity change from 0 to 264192 04:15:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002706000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000007604000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:00 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ff4f652d70000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 04:15:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x6c, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x6c}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1415.176575][ T9854] EXT4-fs (loop1): bad geometry: block count 637534336 exceeds size of device (66048 blocks) 04:15:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x6c, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x6c}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:15:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x6c, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x6c}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1415.207902][ T25] audit: type=1326 audit(1621052100.008:4404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9895 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 04:15:00 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffffda0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:00 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sysvipc/shm\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/164, 0xa4}], 0x1, 0x0, 0x0) 04:15:00 executing program 3: syz_io_uring_setup(0x65c8, &(0x7f00000021c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) clone(0x49040100, 0x0, 0x0, 0x0, 0x0) [ 1415.284113][ T9907] loop5: detected capacity change from 0 to 2048 [ 1415.303639][ T9907] EXT4-fs (loop5): blocks per group (292352) and clusters per group (16384) inconsistent [ 1415.309525][ T9911] loop1: detected capacity change from 0 to 264192 04:15:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x64}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1415.341043][ T9911] EXT4-fs (loop1): bad geometry: block count 654311552 exceeds size of device (66048 blocks) 04:15:00 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x141}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2d) 04:15:00 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffffe20000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000007704000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002806000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x64}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:15:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000580)={0xfffffffffffffffe, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0xffff0000}, 0x0) [ 1416.039154][ T25] audit: type=1326 audit(1621052100.848:4405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9895 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 04:15:00 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fd752f6f40000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:00 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x141}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2d) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x64}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1416.132174][ T9944] loop5: detected capacity change from 0 to 2048 [ 1416.138625][ T9948] loop1: detected capacity change from 0 to 264192 [ 1416.146234][ T9944] EXT4-fs (loop5): blocks per group (292608) and clusters per group (16384) inconsistent 04:15:01 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8982, 0x0) 04:15:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002906000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000007804000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/164, 0xa4}], 0x1, 0x0, 0x0) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffffff40000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1416.185352][ T9948] EXT4-fs (loop1): bad geometry: block count 671088768 exceeds size of device (66048 blocks) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x54, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x54}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffffff50000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x17, 0xa, 0x101}, 0x14}}, 0x0) 04:15:01 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x31cd}, 0x0) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x54, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x54}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffffff60000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1416.315083][ T9987] loop1: detected capacity change from 0 to 264192 [ 1416.321968][ T9986] loop5: detected capacity change from 0 to 2048 [ 1416.331181][ T9986] EXT4-fs (loop5): blocks per group (292864) and clusters per group (16384) inconsistent [ 1416.342733][ T9987] EXT4-fs (loop1): bad geometry: block count 687865984 exceeds size of device (66048 blocks) 04:15:01 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5452, 0x0) 04:15:01 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/partitions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}], 0x1, 0x0, 0x0) 04:15:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002a06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000007904000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffffdf90000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x54, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x54}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffffffb0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000500), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)={0x24, r2, 0x5, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x24}}, 0x0) 04:15:01 executing program 3: clone(0x8000100, 0x0, 0x0, 0x0, 0x0) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x6c, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x6c}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x6c, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x6c}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1416.498377][T10030] loop5: detected capacity change from 0 to 2048 [ 1416.509523][T10030] EXT4-fs (loop5): blocks per group (293120) and clusters per group (16384) inconsistent [ 1416.521994][T10029] loop1: detected capacity change from 0 to 264192 04:15:01 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 04:15:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000007a04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1416.556734][T10029] EXT4-fs (loop1): bad geometry: block count 704643200 exceeds size of device (66048 blocks) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000007fc0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002b06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:01 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000001380)=[{0x0, 0x0, 0x80000000}]) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x6c, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x6c}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1416.599028][T10029] loop1: detected capacity change from 0 to 264192 [ 1416.622082][T10029] EXT4-fs (loop1): bad geometry: block count 704643200 exceeds size of device (66048 blocks) 04:15:01 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = io_uring_setup(0x4e1d, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000200)=r0, 0x1) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffffdfd0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x18, &(0x7f0000000040), 0x4) [ 1416.672668][T10068] loop5: detected capacity change from 0 to 2048 [ 1416.703932][T10068] EXT4-fs (loop5): blocks per group (293376) and clusters per group (16384) inconsistent 04:15:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000038604000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x64}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1416.755955][T10087] loop1: detected capacity change from 0 to 264192 04:15:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setrlimit(0x0, &(0x7f0000000000)={0x0, 0x7}) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffffffd0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x64}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:15:01 executing program 0: clone(0x4000900, 0x0, 0x0, 0x0, 0x0) [ 1416.796451][T10087] EXT4-fs (loop1): bad geometry: block count 721420416 exceeds size of device (66048 blocks) [ 1416.858834][T10110] loop5: detected capacity change from 0 to 2048 [ 1416.876158][T10110] EXT4-fs (loop5): blocks per group (296451) and clusters per group (16384) inconsistent 04:15:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002c06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000003fe0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x890d, 0x0) 04:15:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000038704000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x64, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x64}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:15:01 executing program 2: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1416.922961][T10087] loop1: detected capacity change from 0 to 264192 [ 1416.936182][T10087] EXT4-fs (loop1): bad geometry: block count 721420416 exceeds size of device (66048 blocks) 04:15:01 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffffffe0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/zoneinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}], 0x1, 0x0, 0x0) [ 1416.990550][T10142] loop5: detected capacity change from 0 to 2048 [ 1417.017699][T10142] EXT4-fs (loop5): blocks per group (296707) and clusters per group (16384) inconsistent [ 1417.058058][T10146] loop1: detected capacity change from 0 to 264192 [ 1417.094471][T10146] EXT4-fs (loop1): bad geometry: block count 738197632 exceeds size of device (66048 blocks) 04:15:02 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x54, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) 04:15:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000038804000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 2: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) 04:15:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000001ff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000001380)=[{0x0, 0x0, 0x7fff}, {0x0, 0x0, 0x80000000}]) 04:15:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002d06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000fff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 0: clone(0x1ea08080, 0x0, 0x0, 0x0, 0x0) 04:15:02 executing program 2: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x200000bf}], 0x2) [ 1417.431481][T10173] loop5: detected capacity change from 0 to 2048 [ 1417.447562][T10178] loop1: detected capacity change from 0 to 264192 [ 1417.457494][T10173] EXT4-fs (loop5): blocks per group (296963) and clusters per group (16384) inconsistent 04:15:02 executing program 0: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000200)=@ceph_nfs_fh={0x8, 0x1, {0x4004}}, 0x0) 04:15:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002e06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1417.482574][T10178] EXT4-fs (loop1): bad geometry: block count 754974848 exceeds size of device (66048 blocks) 04:15:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffff7ff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) writev(r0, &(0x7f00000004c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 04:15:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, 0x0, 0x0) 04:15:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000038904000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000580)={0xfffffffffffffffe, 0x0, &(0x7f0000000540)={0x0}}, 0x7) 04:15:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, 0x0, 0x0) 04:15:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffffbff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000002f06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1417.618956][T10217] loop1: detected capacity change from 0 to 264192 [ 1417.630255][T10217] EXT4-fs (loop1): bad geometry: block count 771752064 exceeds size of device (66048 blocks) [ 1417.650768][T10228] loop5: detected capacity change from 0 to 2048 04:15:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x34}]}) 04:15:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, 0x0, 0x0) 04:15:02 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000001380)=[{&(0x7f0000000180)="96", 0x1, 0x80000000}, {&(0x7f0000000280)='8', 0x1}]) 04:15:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500ffffff8c04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1417.681351][T10228] EXT4-fs (loop5): blocks per group (297219) and clusters per group (16384) inconsistent 04:15:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0003ffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) 04:15:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fd05affff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r0) 04:15:02 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) ppoll(&(0x7f0000000200)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) signalfd4(r1, &(0x7f0000000100), 0x8, 0x0) 04:15:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500ffffff9704000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1417.800900][T10258] loop5: detected capacity change from 0 to 2048 [ 1417.801080][T10257] loop1: detected capacity change from 0 to 264192 [ 1417.818446][T10258] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) [ 1417.872213][T10257] EXT4-fs (loop1): bad geometry: block count 788529280 exceeds size of device (66048 blocks) 04:15:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f01b8ffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x16}, {0x6}]}) 04:15:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) 04:15:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f02b8ffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000009f04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1417.940733][T10257] loop1: detected capacity change from 0 to 264192 [ 1417.948883][T10257] EXT4-fs (loop1): bad geometry: block count 788529280 exceeds size of device (66048 blocks) [ 1417.960184][T10290] loop5: detected capacity change from 0 to 2048 [ 1417.973613][T10290] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:02 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f03b8ffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1418.014197][T10305] loop1: detected capacity change from 0 to 264192 [ 1418.023813][T10305] EXT4-fs (loop1): bad geometry: block count 805306496 exceeds size of device (66048 blocks) 04:15:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {0x0}], 0x2) 04:15:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003106000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1418.059724][ T25] audit: type=1326 audit(1621052102.869:4406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10298 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 1418.091575][T10318] loop5: detected capacity change from 0 to 2048 [ 1418.142287][T10318] EXT4-fs (loop5): blocks per group (302848) and clusters per group (16384) inconsistent [ 1418.156373][T10328] loop1: detected capacity change from 0 to 264192 [ 1418.168882][T10328] EXT4-fs (loop1): bad geometry: block count 822083712 exceeds size of device (66048 blocks) 04:15:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf250200000008000100000000003c0007"], 0xa0}}, 0x0) 04:15:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {0x0}], 0x2) 04:15:03 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f04b8ffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:03 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x4c}, 0x4c}, 0x8}, 0x0) 04:15:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000edc004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:03 executing program 3: syz_io_uring_setup(0x7b70, &(0x7f0000000100), &(0x7f0000000000/0x1000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 04:15:03 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f05b8ffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {0x0}], 0x2) [ 1418.837775][T10349] loop5: detected capacity change from 0 to 2048 [ 1418.846438][T10349] EXT4-fs (loop5): blocks per group (311533) and clusters per group (16384) inconsistent [ 1418.857884][T10355] loop1: detected capacity change from 0 to 264192 04:15:03 executing program 0: syz_io_uring_setup(0xffffffff, &(0x7f0000000240), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 04:15:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)}], 0x2) 04:15:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500000003c104000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:03 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f06b8ffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1418.903664][T10355] EXT4-fs (loop1): bad geometry: block count 838860928 exceeds size of device (66048 blocks) 04:15:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)}], 0x2) 04:15:03 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/vmallocinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/202, 0xca}, {&(0x7f0000000100)=""/164, 0xa4}, {&(0x7f0000000200)=""/220, 0xdc}, {&(0x7f0000000300)=""/161, 0xa1}], 0x4, 0x0, 0x0) 04:15:03 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00e0ffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1419.002093][T10355] loop1: detected capacity change from 0 to 264192 [ 1419.010107][T10380] loop5: detected capacity change from 0 to 2048 04:15:03 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/stat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/202, 0xca}], 0x1, 0x0, 0x0) 04:15:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)}], 0x2) 04:15:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)={0xec0, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1e88, 0x3, 0x0, 0x1, [{0x12cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x48, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x3d, 0x1, "b257d40b4cb92d417aa9423586bb169b9a1fcf94c8703f03a678bbefc3db06fcd83f65800e69fbeb05604964d2704fbb1b69045314f693bb4e"}, @NFTA_DATA_VERDICT={0x4}]}, @NFTA_SET_ELEM_DATA={0x1280, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd9, 0x1, "7d324a004b25975d1560eb91834f2099d22262d080afa90061a4b1de7b0373eb9616f63abca9fedeb2fbc5874cf4bc3576047271180439efda6564631341ce1371a2d74682534227fcd25c0f6647a326cefa8be0334e9515eabfc3c990e396e00bdd09515837cbb9250916106c489427df29ca3c78ed87fd8fe4547691dce00a81ac08d4824407cf5c5fe0daab1d4259c65dae780bc5af00e76a1bad2f8a6b2045d027f984fb03a5cedf8e283e1a9f3eb2c94bdb7d71f9b27d51295f917a42e58a45716546fcc487b37c2474b801794a8911965be8"}, @NFTA_DATA_VALUE={0x55, 0x1, "2d44c0f94a7386b1aca37cd45fcff00050ccff74e1115b2b219d9ffb044f45a92f1b4950e653d227176638537f18c87cfe48e4e29dd685451a12171e27daf1ea8632da5c2ef2f25c074734f53ac9aebc8a"}, @NFTA_DATA_VALUE={0x19, 0x1, "b55340c01312e32ae71d14241f5ef029df0957645e"}, @NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x75, 0x1, "f2c9540585deaccffedc850dc15fc274eb357c573faedfe510e2c6e7e5f61583ceffa43d59d70221c7c2be7a71f4a1fef66a8c8b196ecac5b44322bf5d4e4f9e01f22595208e969a06fca3da6fa6c9620b8cca41260b9455427dd46926cedc9fac18292f19b154ae60ce5b760f4752188f"}, @NFTA_DATA_VALUE={0x1001, 0x1, "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"}, @NFTA_DATA_VALUE={0x55, 0x1, "6ca7cb85114ecce8cf0455ff82a4b7e4273284438d37ad413183cf214f460f49cfb93a3abc5fc54229c0d9aab85b695c19c83b2e0b50e21f16cce50e1f744adba9aad940ca07be08cff90b2bada09a419d"}]}]}, {0x3cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x2e4, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xcd, 0x1, "9c3db9a9375a03e08fc295f7a42bcaa200afbf7c809394e25b0be7b144c33071b0ae00efcb00e11e116e8911783c4ed50730cd4663d8696891e6b6d3f4980088ba59253200ac5712f44bfe05f1eac424712ae70a8ccad51418bd2cb154db11ccf86531cce7135850e78609d1a4e5b722401ae2f075019928004fb875c6b78f02d68691eeb2fa390f74a6405c8300b09aa8b0542405f9e80567db2fc6ccefbe0e8b71b67b592e9ccdfe85411a09d5b6fbf68d03c350e611c22988f60e22ab5ca616cd5052173863d678"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x49, 0x1, "511cdc6f108445e7421a1080ed3bed1ae95616e50404db1be3c2815107a083cbb1f27d95a9901886d3011ab9397f7b7388cedd917003b95027e19facc78ca3c64612a0317d"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x4d, 0x1, "58c87df553139a922a015a2e2eadaed2fc4f8a56028c34bc685e2309e68f5eace4fef2d6ffd2d005f40514eb04f2a5bfe293b449244f1380083f2c60ad0ac3d22903bdb55ff4c8a2f0"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xc5, 0x1, "95545c93e45b01ac3a9b37515128eddb1ef2cd626ba857df899ae6c5bfc865146d715e768ec3263687aa3c3208909ad65abe056e5243d7d351f2308b5d83155247b7a2941ec0b086cf9e5e4755ea8771367c0610195e3a4dce3c155f76ee1a1a52af599fbed6067bf3fb2908edb0ae5f7221c317c23e75ec5dde506da8c0f6144a52a782edc31009bab9ad944e86743ce3bd572a23eb04a1cc36f5772f24d5da01d33a69ec556d848b76b5874c49ac0a6da53a40d9b7c0fe0fd02ef5a7798465f2"}]}, @NFTA_SET_ELEM_KEY={0x2c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_USERDATA={0x81, 0x6, 0x1, 0x0, "a84d6b210e9911a87649344cd0b6c28029ff327bb540260823e36822b51d497c6b80687fa809711c6f7ce2bec476aff19a9f2806e819445440055c7f291c3318ba94b0246b7bce99e1fef2116cac7c9a5a84986c043de2c461adb88799e27f29e37f34115626e0632907353b066f84c3dae197d7bdaa59f450322a2414"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x50, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x4c, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}]}, {0x79c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x798, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc9, 0x1, "e06887a77cd2a2728f678b11997f8cf82d3974add1a689320f26a92f86a9fb05f4a5df7ca02ea24696381daea7194f5a8f36cf57ca35c1b78a8f0c7df5e757b61eb2383c7151e404171f11e2aa5bbb2d7466b8d0ce9c6bba9f63545072827aa1c0bf19a8abdb7c4655e48c5c77524fa451087d46941fcfbd5565d09f80a086ea048bd7096c1a1bd616ee4578977993b29432abf9628cd40ac53af4caaaf02f92668484402080a3bc3dee3c3487292a673f45c4e49668b829f037c88749940939e85696ee8f"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0xed, 0x1, "1b008f21879dfc6f02cab1e5c4f4a892ed5243b3cfd3cd0208ce5e4b55feb435d50c33f3882abfd914967e3eb9ccd2e4f973bca2d57eda88ab0f2110a4d64f1b3abd35c4c12d4730a4211909b5527ba806c5b5753bf4d81701320da9dcbc4b206f284b3097273f15388930762847975d65365642f6316f06480efbf9259ebc40686613cce91658fe5ad591c3220567d1317d7810d510e35d89b408a255a33380f65771ecc32447325dc25a553e0a6186cd4a216875ee4e1a7bf9262a1a4bc67e3e18f045eb1e8bd7d03a279996d7e3d99f487c026cf60cb498763fd12decb9123a1622a0c8c7bee560"}, @NFTA_DATA_VALUE={0x5a5, 0x1, "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"}]}]}]}]}, 0x1eb0}}, 0x0) 04:15:03 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffff7ffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1419.053279][T10355] EXT4-fs (loop1): bad geometry: block count 838860928 exceeds size of device (66048 blocks) [ 1419.078612][T10380] EXT4-fs (loop5): blocks per group (311555) and clusters per group (16384) inconsistent 04:15:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050000001dd304000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:03 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8940, 0x0) 04:15:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000", 0x12}], 0x2) 04:15:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffffbffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 04:15:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ff9fdffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1419.191566][T10420] loop1: detected capacity change from 0 to 264192 [ 1419.202488][T10420] EXT4-fs (loop1): bad geometry: block count 855638144 exceeds size of device (66048 blocks) 04:15:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x14) 04:15:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000", 0x12}], 0x2) [ 1419.243336][T10425] loop5: detected capacity change from 0 to 2048 [ 1419.275509][T10425] EXT4-fs (loop5): blocks per group (316189) and clusters per group (16384) inconsistent 04:15:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050000001dd504000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffdfdffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:04 executing program 0: clone(0x49000100, 0x0, 0x0, 0x0, 0x0) 04:15:04 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 04:15:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000", 0x12}], 0x2) [ 1419.329426][T10420] loop1: detected capacity change from 0 to 264192 [ 1419.350710][T10420] EXT4-fs (loop1): bad geometry: block count 855638144 exceeds size of device (66048 blocks) 04:15:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050000001dd604000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f7fffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:04 executing program 0: syz_io_uring_setup(0x30, &(0x7f0000000140), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x65c8, &(0x7f00000021c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000002400), &(0x7f0000002240)) 04:15:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040", 0x1b}], 0x2) [ 1419.441063][T10466] loop5: detected capacity change from 0 to 2048 [ 1419.452333][T10466] EXT4-fs (loop5): blocks per group (316701) and clusters per group (16384) inconsistent [ 1419.476349][T10472] loop1: detected capacity change from 0 to 264192 04:15:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1419.509471][T10472] EXT4-fs (loop1): bad geometry: block count 872415360 exceeds size of device (66048 blocks) 04:15:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f8cffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040", 0x1b}], 0x2) 04:15:04 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet(r0, &(0x7f0000000780)=[{{&(0x7f0000000a80)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x4, [@multicast2]}]}}}], 0x18}}], 0x1, 0x0) [ 1419.563779][T10502] loop5: detected capacity change from 0 to 2048 [ 1419.590909][T10502] EXT4-fs (loop5): blocks per group (316957) and clusters per group (16384) inconsistent 04:15:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f97ffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500f4f652d704000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1419.662041][T10515] loop1: detected capacity change from 0 to 264192 [ 1419.688533][T10515] EXT4-fs (loop1): bad geometry: block count 889192576 exceeds size of device (66048 blocks) [ 1419.762416][T10515] loop1: detected capacity change from 0 to 264192 [ 1419.782013][T10541] loop5: detected capacity change from 0 to 2048 [ 1419.791323][T10515] EXT4-fs (loop1): bad geometry: block count 889192576 exceeds size of device (66048 blocks) [ 1419.801905][T10541] EXT4-fs (loop5): Invalid log cluster size: 4143185925 04:15:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1b, &(0x7f00000008c0)={0x1, &(0x7f0000000880)=[{0x6}]}) 04:15:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040", 0x1b}], 0x2) 04:15:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f00004a3000/0x3000)=nil, 0x3000, 0x65) 04:15:05 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fdaffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500ffffffda04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b700000000400000000000", 0x20}], 0x2) [ 1420.418057][ T25] audit: type=1326 audit(1621052105.229:4407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10557 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 1420.444177][T10565] loop5: detected capacity change from 0 to 2048 [ 1420.456337][T10565] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:05 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fe2ffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:05 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x4c}, 0x33fe0}}, 0x0) 04:15:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b700000000400000000000", 0x20}], 0x2) 04:15:05 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000580)={0xfffffffffffffffe, 0x0, &(0x7f0000000540)={0x0, 0xffff0000}}, 0x0) 04:15:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500ffffffe204000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:05 executing program 3: r0 = socket(0x10, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) 04:15:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fchown(r0, 0xffffffffffffffff, 0xee00) [ 1420.465002][T10567] loop1: detected capacity change from 0 to 264192 [ 1420.477743][ T25] audit: type=1326 audit(1621052105.279:4408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10557 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193eb code=0x0 [ 1420.502269][T10567] EXT4-fs (loop1): bad geometry: block count 905969792 exceeds size of device (66048 blocks) 04:15:05 executing program 0: add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="bf", 0x1, 0xfffffffffffffffb) 04:15:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003706000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:05 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ff4ffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b700000000400000000000", 0x20}], 0x2) 04:15:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8910, &(0x7f00000003c0)={'tunl0\x00', 0x0}) 04:15:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b7000000004000000000000800", 0x22}], 0x2) 04:15:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x20, 0x0, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 04:15:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x100000005) r4 = fsopen(&(0x7f0000000040)='sockfs\x00', 0x0) flock(r4, 0x6) 04:15:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003806000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1420.630650][T10600] loop5: detected capacity change from 0 to 2048 [ 1420.661832][T10600] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500000000e704000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:05 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ff5ffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b7000000004000000000000800", 0x22}], 0x2) 04:15:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) close(r3) r4 = gettid() r5 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) fstat(r1, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000001980)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfd, 0x8200240}, 0xc, &(0x7f0000000500)=[{&(0x7f0000000940)={0x1e0, 0x42, 0x20, 0x70bd2c, 0x25dfdbfe, "", [@generic="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", @typed={0x9, 0x2a, 0x0, 0x0, @str=')\xdf^,\x00'}]}, 0x1e0}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1268}, {&(0x7f0000000080)={0x18, 0x17, 0x20, 0x70bd2d, 0x25dfdbff, "", [@typed={0x8, 0x22, 0x0, 0x0, @pid}]}, 0x18}, {&(0x7f0000000280)={0x260, 0x33, 0x100, 0x70bd2d, 0x25dfdbfc, "", [@nested={0xfd, 0x6d, 0x0, 0x1, [@typed={0x8, 0x70, 0x0, 0x0, @uid}, @generic="ed4a142f570988970eb14980d7447a6e91c075e79953b894dcc9d5f31e68faae0efefb5e8b1dc4b6255f35caa5d8", @generic="21c49a3989f2955066f494c519b9e658433da54a750c56bd6c047b4ef9089fa9c5600fc14ae414bb3ff47f313497f9baf3c36deb241111791c818ea295d7af598ff70ad4898bf4789bf8d6540bedf4da6580ba24cc9921664b926e4e1c7c2f2bc15b1e47d95da0022686ad4bc7fe591d7e9c8e74286d59b4bda092ea150b0e2af3c38de73eab2bb710ecbc48570b6da28a3e9c3137b585b994a36e48c1d7272915655f98541c3a0dfd8cc216990eb6d9765a0740d20fe77cb31a1768f70b6f4009081a"]}, @generic="941e8482abe419ec6a42ecc642de2fd353408da0d4a8b437ebb7748797693b989f5b170c4fa58a63660526ac5203229e01412a5e97abe39d49e52145f50afbd03aa7715e5115805e54ad4b3e6225faa055acbf3ba9b89de41a27ea39efbebb86edfe1249bfacfb7f8c3ef9f687051d62836c0e165bc6badbf8cd8dcb1a11d715b3ba33e69ac5be9ec9469bdddadc12d221d296cd138a57bd7bdb973b6ef299416b80bdf7061e61747932b4030aec3a5f34045f6f8f82f14e3f33fc03661db9bc2f0c89e41a8c5d7e0d2010e8621824124419b04ea39a1e121ce9259ef36e5e8678fe4cbf82ae0c2e255c988b679add50499347499aa5", @nested={0x47, 0x93, 0x0, 0x1, [@generic="790f0a857d0655abc2cbe15df7e58e9bf29c507ce3bf30395640eff552b3e2ee874e6b340eb138a6aef9802ae422e89c4cb578b3f7d634a86c70d07fe2549646fecbb5"]}, @typed={0x8, 0x43, 0x0, 0x0, @pid}, @typed={0x8, 0x5a, 0x0, 0x0, @fd=r0}]}, 0x260}], 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRESOCT=r6, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32=0xee00, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="00000000000100000002000000a7d3f3db2c0b8e26dc08a77818a909a8de8130f36ae6f040871ce37981a1a4c7fa63ba9ee326392fe6ea4d14474acb4a995b67f31727b0c3c76c6935b7a4b9d88344b008000000fb3caa34f149173ac413b6e94ceb3736ccb76df6782e3ba0f71868afa49666ac946323ce224860dc8f26f416456ba680708a411bf362dc353df004df09613b75cba809e58e4fb948a75700c7576e29c70691a2fe626e6e3dadc5e36727241d84c82f7dadc34edc17d46c277e3864964c39935e57619ebbdfbd638dbd87824c91d6a56c9a970c907bca89d87bac4dd0f0ff92ff3bc2e70811f6cc1a63b34d502c69", @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0xc0, 0x40040}, 0x4000) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r9, r8, 0x0, 0x100000005) 04:15:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003906000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1420.742973][T10630] loop1: detected capacity change from 0 to 264192 [ 1420.769062][T10630] EXT4-fs (loop1): bad geometry: block count 939524224 exceeds size of device (66048 blocks) 04:15:05 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ff6ffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b7000000004000000000000800", 0x22}], 0x2) [ 1420.855115][T10646] loop5: detected capacity change from 0 to 2048 04:15:05 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffbffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b700000000400000000000080000", 0x23}], 0x2) 04:15:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b700000000400000000000080000", 0x23}], 0x2) [ 1420.896077][T10646] EXT4-fs (loop5): blocks per group (321280) and clusters per group (16384) inconsistent [ 1420.968725][T10663] loop1: detected capacity change from 0 to 264192 [ 1420.988776][T10663] EXT4-fs (loop1): bad geometry: block count 956301440 exceeds size of device (66048 blocks) [ 1421.091876][T10663] loop1: detected capacity change from 0 to 264192 [ 1421.101441][T10663] EXT4-fs (loop1): bad geometry: block count 956301440 exceeds size of device (66048 blocks) 04:15:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x1a4, 0xfd}, {0x16}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0xfff, 0x40, 0x80}, {0x3, 0x81, 0x2, 0x6}, {0x9, 0xc3, 0x20, 0x1000}]}) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f0000000140)=""/72, 0x48}, {&(0x7f00000001c0)=""/59, 0x3b}, {&(0x7f0000000200)=""/101, 0x65}, {&(0x7f0000000280)=""/201, 0xc9}, {&(0x7f0000000380)=""/21, 0x15}, {&(0x7f00000003c0)=""/74, 0x4a}, {&(0x7f0000000440)=""/86, 0x56}, {&(0x7f00000004c0)=""/60, 0x3c}, {&(0x7f0000000500)=""/199, 0xc7}], 0x9, 0xf5d, 0x80) 04:15:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffdffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500d752f6f404000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b700000000400000000000080000", 0x23}], 0x2) 04:15:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003a06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000019007f5f00fe01b2a4a2809302060000fd000001020b00000a0008003500281014000000190016407fffffff0022de1338d54400009b84136ef75afb83de4411001600c43ab82200000000f2ff00000000", 0x55}], 0x1}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000001080), 0x3, 0x150400) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) close(r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000010c0)={0x0}, &(0x7f0000001100)=0xc) clone3(&(0x7f0000001340)={0x1080, &(0x7f0000001140), &(0x7f0000001180), &(0x7f00000011c0)=0x0, {0xe}, &(0x7f0000001200)=""/30, 0x1e, &(0x7f0000001240)=""/156, &(0x7f0000001300)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) newfstatat(0xffffffffffffff9c, &(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) r8 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, &(0x7f0000000200)=ANY=[@ANYBLOB='mode=00000000000000000000000,huge=always,huge=advise,nr_blocks=0,mpol=bind=static,nr_inodes=B81,huge=advise,gid=', @ANYRESHEX=r9]) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbff, 0x100}, 0xc, &(0x7f0000000b40)=[{&(0x7f0000000240)={0x21c, 0x2e, 0x400, 0x70bd27, 0x25dfdbfb, "", [@nested={0x20a, 0x52, 0x0, 0x1, [@generic="56e423e182178902fe8e58091c587c7b248a", @generic="16d88b422989dbbe5d5ca355abb903e67bcfd52b0b8643e9f0fd4441e381611bc81cb9f2c14c1b6ef290d437efa31d4bea4745c966afbc369c554fa2a705ac9850fee0eb06120d855e3deac69fdf37f9fef217dd349d0485ceca9278afa27a240d6aa952bd34c37d21b782c01c263f1959385d6d5b37404b75cbb14a20d44d51334a6baa0cd7f992ba59515c181e0dd7a6e67104bf3409d943f0ecd80b8b5ebf32352d0f8fade36bfcfc782a6c5e56baa3dddcc965643ffcf7e712c36ce5bee41f43", @typed={0xc, 0x26, 0x0, 0x0, @u64=0x7560}, @generic="8c4e99c722f87c0e527ca13f1733e3b6bf5b894dc8247f26121bac262c92312d0c4842cdc0192fb162bdc47b032f1066d3def7f426281e17b13fa607f70840464b5a5487decb7902f4e75d2aa3511d849d810abbbadee95b571defb462a418afcaa79cb8ec6669e2757f0acabdaae9a5b8c9aadab3e6c4aee9723d492d322363ad1ad57fa6823a7229fd0fcbb9ce4ab7a076f8298fe1cc536ae9b11e2ce6d1dbd993cfa22480bc7e4a4ef237058d3ec0", @generic="1553c9bfed68c380ce3178766572dfcf4d1315aa411136ed71854a65c70d828d61949e7cf909b05ae2bde5fe650b5c01596433d45d93cb962e51176cf90510af610ce8d6f5f5ee0aebb88e4a06d0c6aa127bab02cc99a3df632b464d68e1262be08e17a3baf757f598a44104cc82ad749e13131fa5a3"]}]}, 0x21c}, {&(0x7f0000000100)={0x14, 0x16, 0x10, 0x70bd25, 0x25dfdbfc, "", [@typed={0x4, 0x82}]}, 0x14}, {&(0x7f0000000480)={0x134, 0x13, 0x300, 0x70bd2c, 0x25dfdbfe, "", [@generic="d813e6", @nested={0x10, 0x3, 0x0, 0x1, [@typed={0xc, 0x7f, 0x0, 0x0, @u64=0x1}]}, @generic="aacc8ff883f7594558fe86462c35cc8d1f76a612c837ecee0ec80147b0fdaf6ea2e38e63321c23ada3c89fd86fd68e538fb5602c11bf06461208c11e46d4f2f75314f840bd250886a109264cc6e41d5fdf9c812527834073bd6b31cbef03d67ac6e31d4425e5fcb3403242a002c6047d73e89b63e9e5b8ea229173d158d8e83d6e363a40ecb18a9fc04cd0ca8605d804a13e7cf7ef0ccb59b7f0fb6e08678c508129c1ee2f854de4df4e889893e59831591692f1", @nested={0x42, 0x3f, 0x0, 0x1, [@generic="669849c06ec20c52b7e3bc07dcbc0bc35bd7f94efba2dde1896a148caed2459a085c74487c8b976ab55229a47edb42f67cfb42c137d8d3bae1718f971af3"]}, @generic="e1b2a4de2345f7fc5e27a4d12e69", @typed={0x8, 0x26, 0x0, 0x0, @ipv4=@private=0xa010100}]}, 0x134}, {&(0x7f00000005c0)={0x98, 0x10, 0x100, 0x70bd2a, 0x25dfdbfd, "", [@generic, @typed={0x8, 0x1c, 0x0, 0x0, @u32=0x2}, @nested={0x1c, 0x13, 0x0, 0x1, [@typed={0x14, 0x4b, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x4, 0x51}]}, @generic="7a3236f9cd9564a3aabfc95e32a33643bcce4e45281cba56812568c3bd03064ad9f84870fe2d1584c70537b9a3bd7b2ed19e919235bbd44477a37e9e277b5fe7599ca0cbf6f3c499ba7094c664e4a648be75a0fcd9af0dae3bb1", @typed={0x8, 0x7e, 0x0, 0x0, @str='}[{\x00'}]}, 0x98}, {&(0x7f0000000680)={0x148, 0x1d, 0x200, 0x70bd25, 0x25dfdbfb, "", [@typed={0x14, 0x86, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x27}}, @generic="4ae94974c1d2d4ef182dbd2843c4d140596561d182bc11de0ab8a99acac243c40e2ec08e4e3dacbc4fdaf686da8f24654380c6388dd1033866922b0de8d93ba045ca733079d6cd3e4be2b8b6893183667d6d95ab4747ea9f51dee9dc8f11060adcae23863255056c39397c0bd55682ea7eb1c1b2479b7600e2d6d4e63242071c6642c8a25a842c715c39bc2e695ee073cadcb27f86dac053b79b44d368fd75463da7fc110f17c3d03e548aee886795f29359d1349a1fe63470ff3fbc2680d834418aa4223c8c87cd913946c7a5f8f535d4ed31ba3db5b4fb83502c1be648", @typed={0xc, 0x1a, 0x0, 0x0, @u64=0x1000}, @generic="0ca111c58eb7ee832d0a1119db90be57e00129946842138c98829efb3b1f8d1d2ee37d1d471c6ba4c527dd96ed76bf34a8584d7dfed215"]}, 0x148}, {&(0x7f0000000800)={0x54, 0x25, 0x200, 0x70bd28, 0x25dfdbfc, "", [@generic="ca5ac03e7c7181de3c19feba247dc06f3510a7c6b2d5e138c7", @typed={0xc, 0x8b, 0x0, 0x0, @u64=0x44}, @typed={0xa, 0x1a, 0x0, 0x0, @str='{\'.([\x00'}, @typed={0x8, 0x10, 0x0, 0x0, @uid}, @typed={0x8, 0x90, 0x0, 0x0, @binary="95173424"}]}, 0x54}, {&(0x7f0000000880)={0x298, 0x22, 0x2, 0x70bd25, 0x25dfdbfc, "", [@nested={0x10, 0x9, 0x0, 0x1, [@typed={0xc, 0x92, 0x0, 0x0, @u64}]}, @typed={0x8, 0x54, 0x0, 0x0, @fd=r0}, @nested={0x266, 0xa, 0x0, 0x1, [@generic="17bf558d303f55f091081ad72f23419508cb689c00c53222a8491b4a64a83b8517475782ae08bef458527a5f4857330c3d50aa6b4f42ad7b4d56a91fdc555cb3f4340123f40238e2085a0ecbc2182f5b81541cc75aca53fdecd3a93caa7d9878d479070b3a430949a905c1a9b155bcb31d7105324a836ebdd8265120e1f3259d8db46c5931c345ffd4c135714013a4a900174798d074a7bfcf2b0fe404f5b9841ded865b0b2f7f88b2f194615978ccf1c8080ee0443bbb5646f0d6cb2f8342f776d51690067ca4d211e2dfbe8b579c5b9f7f99673f65a7a22b56f8c2b9", @generic="d2bc9d8ad7200d17c9f5c03fedd1e9eee56571fdd2785763fbc55776e3bd0729c192dce4356b0436102e8ef40397a7835deff49617d462927d18d5ab1076eae78dfe013c8931806fd85d449e9a91c321ce9f45feae16aa5ed24be5c80bae9084a2a856b4a35be4be40db0e97a20a5f6eccd0c4bf7bd4036276719c22585a9bce57bc73a9e488add01b33ef15e06fa5750ec2efc640e29b57c7a7d8d68c3eb938ee", @generic="35998ccde636e1ef2160c9d0bc14d42fc4565cacf6b5c7ad8b0b6d65e87d88c9770d8ea67af3a8cf543905604acfc26794d21c736b51ea408342d3fb32ec24d1c0b3d535ec17f7d46af280d3fe8c85129d787f61cf1b90c6564c7f7802f1849bdf855e0572c47834c5b3be9ac1b05a385e178b140bd8704f2f4f87eaf2e9fb8932f76941cd8cbb5eae05dc5a55d2e798d6c0e07014ece311a92bf31e005eed919b5f7c8b18e398ecae48e9c6114df86fca1a20b5dc60afd0b42078b34c8ecac14302faace50ad918e1ad088d6ef384f0833f4c2b17c4df658100e7772e225ef5fed0c594"]}, @typed={0x8, 0x17, 0x0, 0x0, @u32=0x1}]}, 0x298}], 0x7, &(0x7f0000001480)=[@rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r0, r1, r2, r3, r0, r4]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r9}}}], 0xe0, 0x4000}, 0x20040000) 04:15:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000180)="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", 0x1000, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000024c0)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}, {&(0x7f0000001300)="886d2ac15aec3cb2b0a088149bbd5ccfe51e8a792ab6f63de855e5a7", 0x1c}], 0x0, &(0x7f0000000140)) ioctl$FIONCLEX(r0, 0x5450) 04:15:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655ffeffffff0000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffffff404000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1421.231246][T10692] loop5: detected capacity change from 0 to 2048 [ 1421.254239][T10692] EXT4-fs (loop5): Invalid log cluster size: 1389821957 [ 1421.264736][T10696] loop1: detected capacity change from 0 to 264192 04:15:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x1) 04:15:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000001000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003b06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x82080, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') r1 = creat(&(0x7f0000000280)='./file1\x00', 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[], 0x191) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000002, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r2, &(0x7f0000000000)='./file2\x00', 0x250043, 0x20) close(r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000140)='./file1\x00', r1, &(0x7f0000000180)='./file0\x00') [ 1421.294595][T10696] EXT4-fs (loop1): bad geometry: block count 973078656 exceeds size of device (66048 blocks) [ 1421.326991][T10711] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. 04:15:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x1) 04:15:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000008000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:06 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6e66733d6e6f56160f3fe782ea3765001ee7f1b7ac1ce6415315be15387be873d0d36d122ccaf2508815343300bdd59f719271574831a56db62ecb0573a5f3185012f259f437f243125493fd46d0869f8f24934ad9ff0920ca434101"]) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) [ 1421.369650][T10711] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1421.391703][T10722] loop5: detected capacity change from 0 to 2048 [ 1421.411158][T10722] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffffff504000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x1) 04:15:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x0, 0x10000008}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x1, 0x9, 0xd6, 0x8, 0x0, 0x4a93, 0x28800, 0x9, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x4008, 0x3, 0x7ff, 0x3, 0x6, 0x5743, 0x8, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x1, r1, 0x9) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x4, 0xff, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x3, 0x7}, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x205) sendfile(r2, r3, 0x0, 0x1c500) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780), 0x100) 04:15:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000008000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1421.438031][T10737] loop1: detected capacity change from 0 to 264192 [ 1421.469314][T10737] EXT4-fs (loop1): bad geometry: block count 989855872 exceeds size of device (66048 blocks) 04:15:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000000c0ed000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x70d683) sendfile(r0, r0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@md0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='affs\x00', 0x200080, &(0x7f0000000200)='\x00') rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000004, 0x13, r1, 0xd791000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) r4 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_migrate\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x4) 04:15:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) [ 1421.545245][T10761] loop5: detected capacity change from 0 to 2048 [ 1421.565627][T10761] EXT4-fs (loop5): Invalid log cluster size: 4294901765 [ 1421.582731][T10737] loop1: detected capacity change from 0 to 264192 04:15:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003c06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffffff604000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000010001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1421.608954][T10737] EXT4-fs (loop1): bad geometry: block count 989855872 exceeds size of device (66048 blocks) 04:15:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000020001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffffdf904000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1421.709636][T10787] new mount options do not match the existing superblock, will be ignored [ 1421.719019][T10797] loop1: detected capacity change from 0 to 264192 [ 1421.739471][T10791] loop5: detected capacity change from 0 to 2048 04:15:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) [ 1421.752364][T10797] EXT4-fs (loop1): bad geometry: block count 1006633088 exceeds size of device (66048 blocks) [ 1421.755370][T10791] EXT4-fs (loop5): Invalid log cluster size: 4294901765 [ 1421.837543][T10813] loop5: detected capacity change from 0 to 2048 [ 1421.855185][T10813] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:07 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = signalfd4(r1, &(0x7f0000000000)={[0x3]}, 0x8, 0x0) epoll_wait(r2, &(0x7f0000000040), 0x0, 0x43) close(r0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) listen(r3, 0x0) shutdown(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0xfb384c570e8c81b5}) 04:15:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000040001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003d06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffffffb04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000009c0)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000a00)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000400)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r1 = open$dir(&(0x7f0000000100)='./bus\x00', 0x0, 0x82) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) pivot_root(0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)=';', 0x1) creat(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x800) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) lseek(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup(r4) 04:15:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffffffffff070001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000080001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:07 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) socket$inet6_icmp(0xa, 0x2, 0x3a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @timestamp, @window, @mss, @mss], 0x200000000000010d) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x54, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0x40, 0x4) [ 1422.324347][T10830] loop1: detected capacity change from 0 to 264192 [ 1422.341950][T10830] EXT4-fs (loop1): bad geometry: block count 1023410304 exceeds size of device (66048 blocks) [ 1422.352462][T10843] loop5: detected capacity change from 0 to 2048 [ 1422.362140][T10843] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000003e06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:07 executing program 0: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00000002c0)=0xece) fcntl$setsig(r1, 0xa, 0x12) ptrace$setopts(0x4206, r0, 0x1, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) syz_io_uring_setup(0x2de2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) syz_open_procfs(r0, &(0x7f0000000040)='net/psched\x00') recvmmsg(r3, &(0x7f0000005540)=[{{0x0, 0x280076ed, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a40c1, 0x103}}], 0x10002, 0x0, 0x0) dup2(r1, r3) recvmmsg(r2, &(0x7f0000004800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup2(r1, r2) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/246, 0xf6}, {&(0x7f0000006580)=""/102400, 0x19000}, {&(0x7f0000000200)=""/8, 0x8}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/156, 0x9c}], 0x5, &(0x7f0000000540)=""/170, 0xaa}, 0x6}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/123, 0x7b}, {&(0x7f0000000680)=""/150, 0x96}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000000740)=""/61, 0x3d}, {&(0x7f00000007c0)=""/183, 0xb7}, {&(0x7f0000000880)=""/217, 0xd9}, {&(0x7f0000000980)=""/40, 0x28}, {&(0x7f00000009c0)=""/128, 0x80}, {&(0x7f0000000a40)=""/50, 0x32}], 0x9}, 0x6}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000b40)=""/144, 0x90}, {&(0x7f0000000c00)=""/134, 0x86}, {&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000005580)=""/4096, 0x1000}, {&(0x7f0000000cc0)=""/104, 0x68}, {&(0x7f0000000d40)=""/25, 0x19}], 0x6}, 0x9}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000e00)=""/157, 0x9d}], 0x1}, 0x4}], 0x4, 0x60, &(0x7f0000001000)={0x0, 0x3938700}) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x16) 04:15:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500000007fc04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f0000000000000c0001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee0796", 0x17}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000180001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee0796", 0x17}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffffdfd04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1422.490948][T10876] loop1: detected capacity change from 0 to 264192 [ 1422.505384][T10884] loop5: detected capacity change from 0 to 2048 [ 1422.515286][T10876] EXT4-fs (loop1): bad geometry: block count 1040187520 exceeds size of device (66048 blocks) [ 1422.526002][T10884] EXT4-fs (loop5): blocks per group (326663) and clusters per group (16384) inconsistent 04:15:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee0796", 0x17}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:07 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000400001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1422.620681][T10904] loop5: detected capacity change from 0 to 2048 [ 1422.651218][T10904] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41b", 0x23}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004106000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:08 executing program 0: socketpair$unix(0x1, 0xc98b9dd4989a60c3, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x3, 0xfffff025}, {0x6cac, 0x0, 0x0, 0xfffffffd}]}, 0x16) 04:15:08 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000000ffffe00001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:08 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) r0 = semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) unshare(0x44020000) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) r1 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)=[0x1000, 0x1]) r2 = semget$private(0x0, 0x4007, 0x0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000140)=[0x0, 0x8, 0x2, 0x0]) semop(r2, &(0x7f00000000c0)=[{0x1, 0xf2, 0x800}, {0x1, 0x2}, {0x0, 0xcd53, 0x1800}, {0x0, 0xfffe, 0x1000}], 0x4) semop(r1, &(0x7f0000000080)=[{}, {0x1, 0xfffc}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)=[0x0, 0x8, 0x2, 0x0]) 04:15:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffffffd04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41b", 0x23}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:08 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) r2 = clone3(&(0x7f0000000480)={0x20808000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1], 0x1}, 0x58) r3 = fcntl$getown(r0, 0x9) r4 = gettid() ptrace$setopts(0x4206, r2, 0x1, 0x100005) tkill(r4, 0x36) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) kcmp(r3, r4, 0x6, r0, r0) 04:15:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41b", 0x23}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) [ 1423.377416][T10930] loop1: detected capacity change from 0 to 264192 [ 1423.387629][T10935] loop5: detected capacity change from 0 to 2048 [ 1423.396258][T10930] EXT4-fs (loop1): bad geometry: block count 1090519168 exceeds size of device (66048 blocks) [ 1423.399755][T10935] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffffffe04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:08 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000101000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:08 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) sendfile(r2, r3, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) stat(0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) getpgid(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000100)) openat$nvram(0xffffffffffffff9c, 0x0, 0x90082, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)=[{&(0x7f0000000000)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xa001}, {0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1400"/16, @ANYRES32=r4, @ANYRES32=r3], 0x14, 0x40}], 0x2, 0x0) 04:15:08 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000000ffffb80101000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:08 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000201000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1423.549372][T10976] loop5: detected capacity change from 0 to 2048 [ 1423.563429][T10976] EXT4-fs (loop5): Invalid log cluster size: 4294901765 [ 1423.576101][T10981] loop1: detected capacity change from 0 to 264192 [ 1423.592788][T10981] EXT4-fs (loop1): bad geometry: block count 1107296384 exceeds size of device (66048 blocks) [ 1423.662914][T10978] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1423.675128][T10978] File: /root/syzkaller-testdir728818096/syzkaller.LsPmyl/6671/bus PID: 10978 Comm: syz-executor.0 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000a, 0x50, r0, 0xf7f30000) open_by_handle_at(r0, &(0x7f0000000040)=@shmem={0xc, 0x1, {0xb}}, 0x412f02) 04:15:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500000001ff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000040201000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000000ffffb80201000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1424.269364][T11013] loop1: detected capacity change from 0 to 264192 [ 1424.278275][T11013] EXT4-fs (loop1): bad geometry: block count 1124073600 exceeds size of device (66048 blocks) [ 1424.296637][T11020] loop5: detected capacity change from 0 to 2048 04:15:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e4", 0x2c}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) getsockname(r1, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000001c0)=0x80) sendmsg$nl_xfrm(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2010a426}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@newspdinfo={0x1c, 0x24, 0x0, 0x70bd2b, 0x25dfdbfd, 0x8, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x41) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000301000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) [ 1424.318347][T11020] EXT4-fs (loop5): blocks per group (327425) and clusters per group (16384) inconsistent 04:15:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050000000fff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e4", 0x2c}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000000ffffb80301000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) getsockname(r1, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000001c0)=0x80) sendmsg$nl_xfrm(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2010a426}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@newspdinfo={0x1c, 0x24, 0x0, 0x70bd2b, 0x25dfdbfd, 0x8, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x41) 04:15:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e4", 0x2c}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000401000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) [ 1424.480804][T11057] loop1: detected capacity change from 0 to 264192 [ 1424.489197][T11059] loop5: detected capacity change from 0 to 2048 [ 1424.505963][T11057] EXT4-fs (loop1): bad geometry: block count 1140850816 exceeds size of device (66048 blocks) [ 1424.523597][T11059] EXT4-fs (loop5): blocks per group (327439) and clusters per group (16384) inconsistent 04:15:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:09 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e462", 0x2d}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000000ffffb80401000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) getsockname(r1, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000001c0)=0x80) sendmsg$nl_xfrm(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2010a426}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@newspdinfo={0x1c, 0x24, 0x0, 0x70bd2b, 0x25dfdbfd, 0x8, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x41) 04:15:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffff7ff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) getsockname(r1, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000001c0)=0x80) sendmsg$nl_xfrm(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2010a426}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@newspdinfo={0x1c, 0x24, 0x0, 0x70bd2b, 0x25dfdbfd, 0x8, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x41) [ 1424.623285][T11057] loop1: detected capacity change from 0 to 264192 [ 1424.633797][T11057] EXT4-fs (loop1): bad geometry: block count 1140850816 exceeds size of device (66048 blocks) 04:15:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e462", 0x2d}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000501000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1424.693465][T11107] loop5: detected capacity change from 0 to 2048 [ 1424.710866][T11104] loop1: detected capacity change from 0 to 264192 [ 1424.726716][T11104] EXT4-fs (loop1): bad geometry: block count 1157628032 exceeds size of device (66048 blocks) 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) getsockname(r1, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000001c0)=0x80) [ 1424.744436][T11107] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004606000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:09 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000000ffffb80501000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x0, 0x0, 0x88ffffff, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'ftp-20000\x00'}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e462", 0x2d}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffffbff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:09 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004706000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1424.857027][T11145] loop1: detected capacity change from 0 to 264192 [ 1424.871291][T11145] EXT4-fs (loop1): bad geometry: block count 1174405248 exceeds size of device (66048 blocks) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000601000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000040601000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1424.920874][T11152] loop5: detected capacity change from 0 to 2048 [ 1424.952332][T11152] EXT4-fs (loop5): Invalid log cluster size: 4294901765 04:15:09 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000380)=0x1f6) r2 = dup2(r0, r1) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002940)={[0x50ae]}, 0x8, 0x100800) r5 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) sendmmsg$unix(r1, &(0x7f0000002a80)=[{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000003c0)="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", 0x1000}], 0x1, &(0x7f0000001600)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x34, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1, r1, r0, 0xffffffffffffffff, r0]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r2]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x120, 0x20000040}, {&(0x7f0000001740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001d80)=[{&(0x7f00000017c0)="a5cd98125447f31859a5b14f7a1a933058855507cef8a7fbc351e98d7f07228850c241128ca5b6b590208a303d52bc6a898725303a06e2adf42f1c4c896b48c85e61e52f514d9644f03ffd8ce986c2942176612f6676f0c388d603bc5483504781c3f3", 0x63}, {&(0x7f0000001840)="a80ff75f5cc6863bdd3b9dc6e3298a688054f436e956327f7d1a928b59e525178afe87e0d40e10a1c7d829ab275c27c3059e4025276ef2e18376dc787608b3ef789627ba3e523e2e327ea13e254a3fc4f7a95cbab86f9e8ea537b6ff21c31e8d411d0ade2433842ed20a36dd66f51fe008b6e55d97059e0083b7d87aac00fb18c9bab9454b29dcafa3d0d68a8f5504941532d8b24f897551866c07a74252d68c3a0b85ce2369ee13", 0xa8}, {&(0x7f0000001900)="256ff12b89e32779386a762a915a63cd6426966a089f343e7fffd840addb72eafbc90b7b13ac0ad4bd26da6fc8e25eda4c9084067f000d5ebac2b98b02773445488d8f66e25f417f56310062376a8bae4216a7904d2bf720a6cd7ef02388305c6a1adbd25532503686881e4b310b24ce85ad1b63014408a850c7d5dfb08158b219073cbaee94bf183690d6528fd3ee128087fb", 0x93}, {&(0x7f0000000280)="d9d8e0bbac10e6b5d1adcec82e5588e21c294d486a3fcf853326ea9b23c5e1e47a89bf7b8800e28086406e8aabe3a662d37b1fea87b0e5fea5e9ce8af1890735b88cda8b49bd35d00bda9ed1a2daf79a84b299fa5c026055bb124adc26660b7a26abe2a98a87bd146ccef63d417ac9c18e135be3874b1495238c922fa349da1cee96f84a5d2eee944636adbee26ef1d03c77dcf7abd627e2adea48a187bbd71353f2a3f53e7cbc8dc19423fef656c9ffadeef7e1ef09b3661c02dd5ae1d759fab8e730a5ac1af668c211044ae49f3849ee4809344d8513acd8f39e7ca681880ac370c0b6c671089b95acf3b6e72146ae3838c59d50412778", 0xf8}, {&(0x7f0000001ac0)="49598a513285fe16c37a5d1423f46574afee72dd7680b0db9d0f2f612d3694a0ae6ed6fe98da7c8513cea61c0b22f90a13258b4536d9b17315ad087efd13119953afc36da5e9b44f2dfb2978bd2750112bb1b58ea676ddb4497e2a41abad8350a78591528ec13ef0ec388a35def7f937951bea5db4d7e0645248192df4cb6befb95bcebbe7cc6c378e67b51e1fcb01f3874f835191014c2d", 0x98}, {&(0x7f0000001b80)="b1a56cc0e3aeb9fb38ab8a82c206d35a79f8b8387a9da51bd10aeb06422c6b8f03299569d676d58391d5857c1160cf036ea5f94271ce866bba8174f152a7d03e74593526389ab4ed3f6d876d48e274fa608696d4bca9f7ba2d93df8196", 0x5d}, {&(0x7f0000001c00)="536775e13c77bd6622530cf3fa7f2953b85cbe274727b03be993b1dc301625b1c79fd2367b1b403c9dd497277d598d33b8918aa0af7c80c3094fce6004a45fffb141d9a8a7257626cf4dde2a7849f55e89d7af2d19d60e9e582cbe204525808afc66d0a7d80c1864ae687e5799605964e013597c4b7efc0d746fb70f865b2b07106905e1945a5afccfd83e965cec", 0x8e}, {&(0x7f0000001cc0)="b33439f69b9d01318f62eb57bf3e4cb3c3099a8be51057b9091edcd776bb1d2ebc800b928588b195bc5e247c1f0934af350a0214a003b195f7b6ceb0cdb328a36ff78ba617f09e441fe8e06099ace49892318c7215186087a8176c3bafd5bed2ba90e3e51a09a5be7ce46465f3b89cdc0e71df754365cfcd80868277d418e21c15fb98e033ce8766d04103d4ea88ddb9d55f9c8229fe0936a2", 0x99}], 0x8, &(0x7f00000013c0)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="f8ff002cfe0000000000000001000000020000024c89e8766692040f542b5ce6c733fce0f17fa89a45aa11d4ff9440533c1512ce0f5a85929a2a6209fd01ec4158431d903a7ff6f6b2f7cb740d2ed6ca301adbe99ebd5b952ccb09cc40d5db45b2d70f41cc5878f4c426d76b1aaab5b5e9a3c31a71e9fae8837944edc7e31c1891814c169b4075ffb3635195a717659c89c510507185aa184c122e7251ab7aba6262", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0], 0xc8, 0x8000}, {&(0x7f00000020c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002740)=[{&(0x7f0000002140)="cf41bdee6ef1f963374ab5c917d4c1e7bdf3f1501d98b12b61a228bc22ff2123cd95d9b181ef67c4c57034e6ba99abc54b737b2c627cf0ef6137bb928509368e66608b1c715d3eb7c406d60b261df41dcb0528c8f0a440f7e6ce636d3797b403fae92c3c84df92163ce603dcdd0e7a197060eda1a306e5486ec29da4236f7b9be7426fa5f8dab51e89b111e862dec7ded22296727b90606e655c23c8e55eee138099de8c786b60751e76", 0xaa}, {&(0x7f0000002200)="480de2ec0e96aa983cdfc7a8182631e7af083a2c9dcb0f62ba8e273f508c44a321795a720fe51f1647c6a10de31b3612ee4ffd5bb1c393eb6044803574116a8f0e2c61e29f7fc6f5cb95cef5f7f737cb42844dee524fd5fa7a46fb8f9b026df0df62d7665405d8dfec0fdb0819fbc458211de256c6ac350e72f8cb4e652ab722cd033eec286955cef90c081153905e7551c10982aecff9ca73bb50", 0x9b}, {&(0x7f00000022c0)="5ce8623da23ef237af0ce092945bb067aeea23715e369945b44e87f6b3685647f6777af6de1b120cac8a43763b0dab2dce2211a8eaa8ed549ca3ca0593280af5635e14bfed027ff26f329ebdcf20fc099c22dddf448fae4975617626d023b454a141d86a74ff35fab675fab63b8b0415debdf44436d744b2407c8bf29ff3d3ef08ba44b118c1cab147a2c9d7602dca5ec2ebbcd780699d248401fe1e3c273ea39e9baadb07ce3b12191b580df8809fc3e27f46f8da25b7a72c2172b6f36259ce1fae7e63be856c1890", 0xc9}, {&(0x7f00000023c0)="b3fc9eda9afc2ea63b24e912aae51de1363e8ec2c41bb050b0de6b28859d8ade79b7ed8ea3cddea3915a54fc698d59bfcaf96136b85e77c22e643578a8b759598f9964d305b0970d0ce3fbe0a5a10543cade10797f83ac0a2f5227ea634c00b2575590126af6989ec374f4c38e9bf1073bab4291e768cdd6f35d2419b61894ba67cae49c7a6d95a2254d8d9b64cd715682d6f6082fba16faaa49b8773919a16d0c9e87218c39f6dc645d2b717e960811f2228fe0f3ec380eb497c4e6564661d460629077137835e0995a3070", 0xcc}, {&(0x7f00000024c0)="e761123eb3c1a1b39aaaa3000fa014626c83984b0689fd89bd5ca1adc78a857ccd2b6ee4dc5e2a8c28e4e9bc613f69003a5e0c888ab6ceb7b98f5c507c7b4a22000c0489e37dbb7589184b0a0928f2abbeee195ac4d5b3", 0x57}, {&(0x7f0000002540)="62a1ff14e5e20b13edc8571db2f9408531da1bf1342227b5c1f09801fae2c4b081b30a7222fe55e82b9cd2c3e5126e7361e9d4c091b0e14ce4dad5d2a1a18e61f5ff5cf8d544cc00bd80473538f9d78aecde4a9287a8fa198f3ba007392ad659a22c1de429d3e4de7b934084dcab37e017853da8446005b1323ea4f3522b7530448f6cc5c10f55d662e67d99062fd5f7766ad8fbc10c441e9d4f5e03049522b7a2eb6189204cf4fd6a57f4", 0xab}, {&(0x7f0000002600)="23e2184da0a248df27075e1bdbd59e80f82959ec7570163a329038edec486167febd919b633d843bb7592f84c299536ec300289cfdddcb", 0x37}, {&(0x7f0000002640)="32fb9145fa7fcf7a5a0e971f4521832dd7624bce3993f6f3b66f8e0b2710e8e62cbdf85f7f8e727de674bb1a6c", 0x2d}, {&(0x7f0000002680)="b3b1aad663aad4653cd8063c63ea168a0e900f47805da1491d9a439f4befb152870536cef28b4d935d7493b9de73e61fdaa69ef083f1516dcc1e84fa83b4be83ed4b241514db8b31dfe847d8eb4772f37ac5f4ff7ffb593b8e1bd5d43e83637e424e98f01beab71bdcf82adeae882ae4c2acbe27a05d5ac7572ef3b9c67367ab6775517432a4f349ec3af874", 0x8c}], 0x9, &(0x7f0000002980)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee01, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r2, r0, r2, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, r4]}}, @cred={{0x1c, 0x1, 0x2, {r3, r6, 0xee00}}}], 0xf0, 0x2004c804}], 0x3, 0x20000840) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2f", 0x2f}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x5) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) exit_group(0x0) 04:15:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000003ffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f00000000ffffb80601000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) [ 1425.006089][T11172] loop1: detected capacity change from 0 to 264192 [ 1425.030477][T11172] EXT4-fs (loop1): bad geometry: block count 1191182464 exceeds size of device (66048 blocks) 04:15:09 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000002c0)="e896764c889af729a0723c40bdeb8084ab0addb4de0d092adf883b4e1d5947134cb53cb624d59ed878b53e96d4bf61fc2937419ea22e6fa295a449865262bf7f9387c99a839e148f1e2693c2700fb8783fc72a9a698b45981ceb683dbe274f6d77ba732bab04b12c49efb33df253f33b0e252ca496ad3e86ab704d19c745c12283fc4ed46116200b05f1abc1fa7dd0f685407a3d56a52188b1e79e4400e1218c7de4ba88cb669fc1381083efe72a694c82d06aa80d07e57aa2bf651609cd29abf52566b601f4c411605a020b978b0403743435c003084a5447c0cd0b5011e146a0d29ed6a98e0eedea6236b2a580fdf73284", 0xf2, 0x9}], 0x0, &(0x7f0000000280)={[{@noauto_da_alloc}, {@acl}]}) [ 1425.092520][T11172] loop1: detected capacity change from 0 to 264192 [ 1425.111017][T11172] EXT4-fs (loop1): bad geometry: block count 1191182464 exceeds size of device (66048 blocks) 04:15:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004806000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:10 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:10 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000040)=ANY=[@ANYBLOB="225066df5f2ea0a811aa2ed9f7da31e6f0b0a0d229911901bd7b4d24ed1ae22ff159e630cfb4e3c1f3abe8db972b98f5e2ea003b7e9d6ba6e244122453b98607b917c5dcd70c1ff6a922ed9ca153f10ffb6033fcd8498a28cda89c27f9abb6a9a6ac2f158514cfa998e98e52e4b641fcb1130f3ba61f170e1d"], 0xa4}}, 0x0) close(r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) close(r4) splice(r4, &(0x7f0000000280)=0x3, r2, &(0x7f00000002c0)=0xfffffffffffff000, 0x9, 0x4) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) preadv(r3, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/138, 0x8a}], 0x1, 0x2, 0x3) 04:15:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:10 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000701000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050000e0ffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1425.137978][T11202] loop5: detected capacity change from 0 to 2048 [ 1425.161275][T11202] EXT4-fs (loop5): Invalid log cluster size: 50331653 04:15:10 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000801000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:10 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}, {&(0x7f0000000040)="53000000fcffffff77040300050020000000002001b70000000040000000000008000000", 0x24}], 0x2) 04:15:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a7b, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[@ANYRES64=r3, @ANYRES16, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="7fa5e630be4f48cbdad153e6145e1502c60cd477688d7419668b42811e5e1e6366ca950eaa436ddde326dfaab8bac5a17b604bc03a0e473715070d62d1b9db4d8d0c644878bb4fcb0b463760b6b281c135a2c13ef8b6c4c7b361dec477402ca5c06f0583c327fb871937ba3375cef161c853dee7f3c5ce37738cb63e0738385d0a3065235f1300667cb49b7795449311222b0ede53f1e086a12aa317f4856e94c86beead39b29c2315e51f7115f18b3197afb359ed1f15b580f9b36570de44e5b22eb6b663f1dfa5c10f96ddfb9aad83a9b78d6dcb5fcddd"], 0xfffffeb5) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 04:15:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:10 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000901000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1425.262972][T11227] loop1: detected capacity change from 0 to 264192 [ 1425.277625][T11227] EXT4-fs (loop1): bad geometry: block count 1207959680 exceeds size of device (66048 blocks) [ 1425.288211][T11232] loop5: detected capacity change from 0 to 2048 04:15:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004906000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:10 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, 0x0, 0x0) 04:15:10 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000a01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) [ 1425.343347][T11227] loop1: detected capacity change from 0 to 264192 [ 1425.347207][T11232] EXT4-fs (loop5): Invalid log cluster size: 3758096389 [ 1425.357998][T11227] EXT4-fs (loop1): bad geometry: block count 1207959680 exceeds size of device (66048 blocks) 04:15:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fff7ffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:10 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, 0x0, 0x0) 04:15:10 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000b01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:10 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, 0x0, 0x0) [ 1425.443955][T11267] loop1: detected capacity change from 0 to 264192 [ 1425.473034][T11267] EXT4-fs (loop1): bad geometry: block count 1224736896 exceeds size of device (66048 blocks) [ 1425.505409][T11284] loop5: detected capacity change from 0 to 2048 [ 1425.529397][T11284] EXT4-fs (loop5): Invalid log cluster size: 4160684037 [ 1425.572850][T11267] loop1: detected capacity change from 0 to 264192 [ 1425.580469][T11267] EXT4-fs (loop1): bad geometry: block count 1224736896 exceeds size of device (66048 blocks) 04:15:10 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000c01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:10 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}], 0x1) 04:15:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fffbffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20) r0 = socket$netlink(0x10, 0x3, 0x8) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600030001000000450000002500000019001b000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000240)=""/153, 0x99}], 0x1, 0x10000, 0xf0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x18000, 0x100) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="d9881ad183bcf53469a708ff72ccf1220a616ea9c905de4b3fdf816c347c61d286fc30e1297461550accbc44440a7a9f7a489a688787c109d31ebb301acae1bee002c7f4457fc71703b5d07b2a9b8e5adf26b9df5ac0fed8bb84311955c275d8c2e919fe21a3ff29cda53ad0653b2cd097758a31f08ecbd883782da0b04674a71a7a38b1723c7735432ad6169097", 0xfffffffffffffdfb}, {&(0x7f0000000040)="f046e13cb64fadd4e093b0b9582a531d000000000000", 0x16}, {&(0x7f0000000400)="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", 0x130}, {&(0x7f0000000540)="ec155172b1b38f534121720d170aff47d2773dea8e6d10a7a4667ab27346f521fcda7a2c42b43b5c9b14f0fbf556836228b5117718e237b517c8f8091efb2689ff39067d0186db32732bac37a3be297ce7031541eccf64107d532d4cec682eb9e6a958f03c6810111c97d19f158e3804102cf9d6bec8a287177caa0895d29be304312d019f6a65b5feb064989f2c7b7e689a1119a6fdc26ea51971f619867523fd088dad34ffde84ae146ca2cfb59bdc598786032865db4151fe4204c78c4511a0a7f9a46fb542e853cd547ebabf7e20643e3e1d28f9", 0xd6}], 0x4) 04:15:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004a06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000), 0x0) 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000d01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) [ 1426.198826][T11316] loop1: detected capacity change from 0 to 264192 [ 1426.207976][T11316] EXT4-fs (loop1): bad geometry: block count 1241514112 exceeds size of device (66048 blocks) [ 1426.218850][T11314] loop5: detected capacity change from 0 to 2048 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000e01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 2: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x1, 0x0, 0x0) r2 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000100)=0x0) timer_settime(r5, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r5, 0x0, &(0x7f00000002c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000380)) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) timer_settime(r0, 0x1, &(0x7f0000000400)={{r6, r7+60000000}}, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x41, 0x1, @tid=r8}, &(0x7f0000000200)) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r2, 0x302, 0x0, 0x0, 0x0, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r9, 0x5, 0x5, &(0x7f00000027c0)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x3938700}, 0x0) 04:15:11 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000), 0x0) 04:15:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500f9fdffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004b06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1426.253863][T11314] EXT4-fs (loop5): Invalid log cluster size: 4227792901 [ 1426.261076][T11316] loop1: detected capacity change from 0 to 264192 [ 1426.281656][T11316] EXT4-fs (loop1): bad geometry: block count 1241514112 exceeds size of device (66048 blocks) 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000f01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000), 0x0) [ 1426.372958][T11357] loop5: detected capacity change from 0 to 2048 [ 1426.399417][T11362] loop1: detected capacity change from 0 to 264192 [ 1426.407525][T11357] EXT4-fs (loop5): Invalid log cluster size: 4260954117 04:15:11 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fdfdffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000001001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004c06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1426.433024][T11362] EXT4-fs (loop1): bad geometry: block count 1258291328 exceeds size of device (66048 blocks) 04:15:11 executing program 2: r0 = socket$inet(0x10, 0x80002, 0x2) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2400001634231e041dfffd946f6105000a0000e8fe02080104000800080014000400ff7e8b2cc4541327d7c5de798f274cb6c92c7498d1f05646121480639f9cbf18a60fb2c4464b5c1a4b301e83304e3bb068211ba7ed0579d6010b24506c06535e4660fa49a7225882c742d19aa67ac2e35afea98918c87fb8732fe43ea4fc5628185447a0c0d1ee03192986300a8335b0727fe3a27dab4b5420a377f3a4826c889edca3ec0b83f1fb9ca14038252656d049e1473ab21af0bdcbdafcf2efa82f9bf96eb49a2eb5560f5ea28b26839e19aa8762e8fe3367619105f30ae5da2a9923a0016f07fff33d299ba1691f7b120dcf11a5d0b7b3eb1ecbbb83921563587a296e91c416781bca0f598df2650eed55bc5a1b52c2b1e20057010047be15960a253155e3277492a3f84b45cab94d12db85b76bf7f6eaf479eb51", 0x13b}], 0x1}, 0x40000c0) 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000001101000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 04:15:11 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005007fffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1426.519609][T11387] loop5: detected capacity change from 0 to 2048 [ 1426.552186][T11387] EXT4-fs (loop5): Invalid log cluster size: 4261216261 [ 1426.554897][T11395] loop1: detected capacity change from 0 to 264192 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000001201000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 2: ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000040)={0x200, 0x0, 0x66, 0x8, 0xbe0}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000080)=0x2) r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80800) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000100)={0x0, "93c22af72bd6060d4ed31134dc41bc3b"}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001100)={r1, "41ed071ea01511728d00cf911d3f427f"}) r3 = fsopen(&(0x7f0000002100)='ntfs\x00', 0x1) fcntl$lock(r3, 0x25, &(0x7f0000002140)={0x1, 0x3, 0x2}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000002180)={0x2, 0xff, 0x8, 0x800, 0x0, "d9b15503c4dc6bc1"}) vmsplice(r3, &(0x7f0000002580)=[{&(0x7f00000021c0)="fdd5e15f", 0x4}, {&(0x7f0000002200)="aa796dde410b979576e8a31b9f40424ff402527a85bac189b4bbf74db72468cf23e5e2e6ad75f6ea8012fd5dd765b476259f535ca06d7357251e89c263fac517f883758f7071a7b31c862f29c7ce456578677db73606c67589d3c7d7f7f08fc233bddcb4caac9eabee87a2356c9813ac8aa9af9f06eb4bf2cf685cf59504db4a22e277b095c8258ed839394859842edbbfe93a738a7cfc657d278df80a194785622c111eaa5b03d5", 0xa8}, {&(0x7f00000022c0)}, {&(0x7f0000002300)="1150050d0cdd8e3ff435a970aa2f5e8fd512374c9f452ba6673f816ed792d9e4fa0be4f3484aecdafd5bdc42cf34c95d728b12447626f2517d7ae3d5a16544c24b76ab9084b42836e78167a994941ead75de76315b45b6f9b2e76b95c2eb597ba43901376cd3ed2f6053ef923a65cd81409950f44910901cc4e7bb0a9e1fc149c7601a69b09c33c0507ba1eb0af447ccde9fc86a6fbbea168216a0d9b90ed7e4cd79a65c35", 0xa5}, {&(0x7f00000023c0)="1e6204e5e4450f241ad3c533c2f4233f618f8bc578568a5463fe79a5d380ba5ee59e94cbfb674c23a60cf03385d6c701f61e4b7348266c714bf79e96abfb52d00daab2ddaf9b886a9d50f87cd69918a6", 0x50}, {&(0x7f0000002440)="8383d70d0a69aa636da50478605a96d00c01461705673c4831e412eadc13066986b1666ae8e0ca86cdb8e13233c4075592e06492a976174a27734111a2e5a50532ce3c31fa9ffb253d4a50bd3f31c0ce843cc3869a2ab74250f99d528d9675e35c5409797319e781c96e587d5980b1096340f18f5601f5f626a0a8b79e84403a26283076c78e9106910d6ff3e85f9918194f6d2d0e59b67cb016d475e51654407e56cc4b5b878c68f9bc10f2a813861475bb18e7018d77f3133a766471e5954aa701838551740ed517ae48aee5c8164a83122f7af32387e45c8b81f5b04966b19228d3cd009acbac4490", 0xea}, {&(0x7f0000002540)="581c3cd436ac213289437b14251c6cf9832a31e2067669cecf16b875330c9fdf1b0ddcb15b7bc89ccd9d683f216fb1170b481e72426dde2ab1f2e5", 0x3b}], 0x7, 0xd) connect$inet(r0, &(0x7f0000002600)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x5) ioctl$TIOCL_SELLOADLUT(0xffffffffffffffff, 0x541c, &(0x7f0000002640)={0x5, 0x6, 0x8001, 0x10001, 0x75}) r4 = syz_open_dev$vcsn(&(0x7f0000002680), 0xfffffffffffffff8, 0x86a03) ioctl$TIOCGICOUNT(r4, 0x545d, 0x0) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f00000026c0)) getpeername$inet(r4, &(0x7f0000002700)={0x2, 0x0, @multicast2}, &(0x7f0000002740)=0x10) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002780)='memory.swap.max\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r5, 0xc400941d, &(0x7f00000027c0)={r2, 0xea9d}) [ 1426.592561][T11395] EXT4-fs (loop1): bad geometry: block count 1275068544 exceeds size of device (66048 blocks) 04:15:11 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) [ 1426.661831][T11395] loop1: detected capacity change from 0 to 264192 [ 1426.668731][T11410] loop5: detected capacity change from 0 to 2048 [ 1426.686932][T11410] EXT4-fs (loop5): Invalid log cluster size: 4286513157 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000001f01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004d06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005008cffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)}], 0x1) [ 1426.707412][T11395] EXT4-fs (loop1): bad geometry: block count 1275068544 exceeds size of device (66048 blocks) 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000002001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) close(r4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r5, 0x40a85323, &(0x7f0000000340)={{0x5, 0xb1}, 'port0\x00', 0x2, 0x180021, 0x0, 0xffffffff, 0x20, 0x1, 0xffffffff, 0x0, 0x2}) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000080)={r4, 0xfffffffffffffff7, 0xe10, 0x5}) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="14000000000000ab0000000000070000009404010000002cea00"], 0x18}}], 0x1, 0x0) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)}], 0x1) 04:15:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000102001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x25}, {}, {0x6, 0x0, 0x0, 0x7ffffff6}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x4000012, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) close(r1) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="73797a311f6ec14dc196fe177407516d1b7875c48571a59c46ae4b108f882d198718ee05b389671965de7f03c3b146bfde2f3e12a4e9c95e53b0cb8c5d5f5d86d5e2021723f7ef5721a55961734a1731c063a230aa66fd9e28a6e0babb5cb4e86d911d279370ee436035550e3394ffb732"], 0xd) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)}], 0x1) [ 1426.821588][T11449] loop5: detected capacity change from 0 to 2048 [ 1426.857987][T11449] EXT4-fs (loop5): Invalid log cluster size: 4287365125 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000002201000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1426.936508][T11477] loop1: detected capacity change from 0 to 264192 [ 1426.979934][T11477] EXT4-fs (loop1): bad geometry: block count 1291845760 exceeds size of device (66048 blocks) 04:15:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004e06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f0000000000000001000000050097ffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) fdatasync(r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0xfffffffffffffff8, 0x6, 0x2, 0x80000000}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x8020}) fdatasync(r1) 04:15:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee", 0x15}], 0x1) 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000002501000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000002e01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee", 0x15}], 0x1) 04:15:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee", 0x15}], 0x1) [ 1427.106553][T11506] loop1: detected capacity change from 0 to 264192 [ 1427.119561][T11506] EXT4-fs (loop1): bad geometry: block count 1308622976 exceeds size of device (66048 blocks) [ 1427.130612][T11512] loop5: detected capacity change from 0 to 2048 04:15:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000680)={'syztnl2\x00', &(0x7f00000005c0)={'syztnl2\x00', 0x0, 0x8, 0x8, 0x7, 0x101, {{0x28, 0x4, 0x0, 0x4, 0xa0, 0x67, 0x0, 0xe0, 0x4, 0x0, @private=0xa010101, @remote, {[@generic={0x44, 0xa, "d1036b37142c31d7"}, @timestamp_addr={0x44, 0xc, 0x6, 0x1, 0xe, [{@empty, 0xeb}]}, @end, @timestamp_addr={0x44, 0x3c, 0x87, 0x1, 0xc, [{@dev={0xac, 0x14, 0x14, 0x35}, 0x8}, {@empty, 0x2}, {@loopback, 0x6}, {@private=0xa010102, 0x6}, {@rand_addr=0x64010100, 0x10001}, {@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x8}]}, @cipso={0x86, 0x39, 0x3, [{0x6, 0xf, "0e0f6fbee743cef5def92929ee"}, {0x5, 0xc, "07fd2bf11256378a9de1"}, {0x0, 0xb, "88491cdcc04e101488"}, {0x5, 0xd, "31176322498cba776a666d"}]}]}}}}}) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000080)="ccfa88bc02ce7474cfbfc755c5d9e393a998347bde7c1247463b1dd7888de9d082e070c3f1b40ba94d8f01af7d7e20faf2c3ecf67615204bdd60077a2b8a4c97b8a54733bf56406f341265cc638a4697e44f8959ea", 0x55}, {&(0x7f0000000140)="64e9d309c7beadf0e891cda8534d2827b99735e1887685dae7222ba12598c89020ea082a2cb07baada5f9a07ff25ad92157988076570059f1d6a1677922c1060b098542a960edcaf7b7ce81004375295e55a5b4b13ed92f1ff79c895c01fc7b128a34cd5c949ee14536db2685890c6c5954e5f68123a4c46cbb9f22551d3520edd62508d051dcf3fbc8d4562816b398160e9e0cfe03e9be2f597", 0x9a}, {&(0x7f0000000280)="1b3071bfaffeb3ea56d5081bab612378633e9bdb8b5453ed56d8013bc78acc88a4f26ebe1cd325adaed5f3142220c8f7df9e5c1a63b55241b126d20ae588efc6e950c34e0658a89235c5eaf33a45ce7375b278d5ef4ae17981c260c3582529fca9bb31f3cc63c06da9727d8c5d853f4945a163a93e55f971b9f917eb227c4491ec9e5e6fd4cbaae2318759f91c184ab2c25b747270253a4059c10fc7b663988541ece1fe76a3d7b7c5ff56056dcde16785d739724bbc502e12b202095b8bf0058a8eb9af7d262c0ee77ec9396cead6f55722e4ecb3cd79ae447804ed896ba96975e8b2690bf0c684fdc34a35aa0a754a16905377", 0xf4}, {&(0x7f0000000380)="c463b07b83f76c", 0x7}], 0x4, &(0x7f00000006c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}, @ip_retopts={{0xcc, 0x0, 0x7, {[@noop, @noop, @cipso={0x86, 0x66, 0x2, [{0x0, 0x6, "c3a9f73b"}, {0x1, 0xa, "fc11b5e24a0a1997"}, {0x6, 0xb, "5df953085c57bf246b"}, {0x2, 0xf, "cbeadfdca7c4dfd0d86f44513f"}, {0x5, 0x5, "4c5519"}, {0x6, 0x2}, {0x5, 0x7, "461a167fee"}, {0x6, 0x11, "124ce2271f5b65d287edb4d2da37e6"}, {0x5, 0x6, "afb0d47b"}, {0x6, 0x11, "54c87b783fc63d08f3eebc101a95cb"}]}, @timestamp={0x44, 0x28, 0xf8, 0x0, 0x9, [0x4, 0x3, 0x8001, 0x9, 0x2, 0x7fff, 0x5, 0x5, 0x0]}, @lsrr={0x83, 0x27, 0xf9, [@private=0xa010102, @broadcast, @loopback, @broadcast, @empty, @private=0xa010101, @multicast2, @local, @private=0xa010101]}, @ra={0x94, 0x4, 0x1}, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}], 0x138}}], 0x1, 0x40000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0033f282896612f92fbd78384553f1d9f7a8f0fa374e3bf565e8818a5c43a9d9479c8cb2b3fa8d7a7452b133bd2d239f432fb842a832531761e913fdd2378e40f5b10de9e7e4f5fad39ec97bf4c0fe93d70ee6d3f5edd2cbde292865cef6a30290fc8cccf5fe1856a6e1ec536a0c622be0d88b37b8b708b272d904ac432ac0ed95c17a2ad851732e93fa9a99718bd69fa754cab5099fcb04985163da6adf9f4f34534a28b34248c58ca26d8fe49095c0871d550757a9e2de3e1c04aa8b9aefd6e0bc21ac9f5de048f8423ac46961e128e8bd11"]) 04:15:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000013001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1427.150106][T11512] EXT4-fs (loop5): Invalid log cluster size: 4288086021 [ 1427.226007][T11506] loop1: detected capacity change from 0 to 264192 04:15:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000004f06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500daffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69", 0x1f}], 0x1) 04:15:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:12 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000300)=[{&(0x7f0000000000)="e03f61cf571744a7d5f4", 0xa}, {&(0x7f0000000140)="8b3dda66b2b8d552fa1137ae17b383e09b31c37203c4f60c0da78ada50f349771c744e3a3ef0b9e0bf2384949c140eb9ea08b059385a11184c4d7bac3b21877b7d4123dab0d85c6f3f31e34f4e5e348897a9174900e7012f56eb36e95e1081be00ecf190ac1a8f8a6d8bf5f4909156c620c784eb4aa27e133260c97b93a066b9430ba40ba196920f94df0307d49f44f5ac4363eec4f3eb10dd5ddcec69b6d52bc7791b8531163a987b42b6b72fe22d2a9a436237f38a639a3bac", 0xba}, {&(0x7f0000000080)="6e59341f104e500de843791ac7aecfbf5214b2ecbcab06fb14e821bdadfe417c68d3b885050b6d3f5e2049ba4bb685c1acc76866c97edc7b5849e672472c3cdeedcda26595d35413a6ea1874f405f5e6082ac1571137ec10efe9edb61c5ac4698e1de94e59c23ca41783", 0x6a}, {&(0x7f0000000200)="608d265146ebdfa8cdba768d23a8702f64975060bd06f560764bff3b46be145d035ef7463b1fb1ec1f03296675b968923a40a60d839f8cc9bd6e2e1985cd1936c8ddae3ee0592d453e30c736ebd2e525334149aae8e4744d5be76c954fd65c9244bcc2adb6e5a8312a586d551d9722e0c22b273005167d99f736c9fcd9b8bbd500cb448d66850043635d", 0x8a}, {&(0x7f00000002c0)="38a4d00b312f6ea86b338d321f480e202e77c7cee4e2faaf395e0dccd055bda915444d2162c3ef", 0x27}], 0x5, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendto$inet(r2, 0x0, 0x0, 0xaad57c81b7a27570, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xb00a0000, 0x0, 0x53) 04:15:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000003201000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1427.267257][T11506] EXT4-fs (loop1): bad geometry: block count 1308622976 exceeds size of device (66048 blocks) 04:15:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69", 0x1f}], 0x1) 04:15:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000003601000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) [ 1427.381812][T11560] loop1: detected capacity change from 0 to 264192 [ 1427.402144][T11559] loop5: detected capacity change from 0 to 2048 [ 1427.414600][T11560] EXT4-fs (loop1): bad geometry: block count 1325400192 exceeds size of device (66048 blocks) 04:15:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000003701000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500e2ffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69", 0x1f}], 0x1) 04:15:12 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000003801000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1427.434111][T11559] EXT4-fs (loop5): Invalid log cluster size: 4292476933 [ 1427.542645][T11597] loop5: detected capacity change from 0 to 2048 [ 1427.557276][T11597] EXT4-fs (loop5): Invalid log cluster size: 4293001221 [ 1427.568256][T11598] loop1: detected capacity change from 0 to 264192 [ 1427.579051][T11598] EXT4-fs (loop1): bad geometry: block count 1342177408 exceeds size of device (66048 blocks) [ 1427.617318][T11598] loop1: detected capacity change from 0 to 264192 [ 1427.626031][T11598] EXT4-fs (loop1): bad geometry: block count 1342177408 exceeds size of device (66048 blocks) [ 1428.187018][T11618] ================================================================== [ 1428.195438][T11618] BUG: KCSAN: data-race in inet_bind_hash / inet_send_prepare [ 1428.202922][T11618] [ 1428.205241][T11618] write to 0xffff88810786a1ce of 2 bytes by task 11617 on cpu 0: [ 1428.212937][T11618] inet_bind_hash+0x1e/0xa0 [ 1428.217530][T11618] inet_csk_get_port+0x7f0/0x890 [ 1428.222455][T11618] __inet_bind+0x3c9/0x560 [ 1428.226857][T11618] inet_bind+0x8c/0xa0 [ 1428.231179][T11618] __sys_bind+0x200/0x290 [ 1428.235679][T11618] __x64_sys_bind+0x3d/0x50 [ 1428.240173][T11618] do_syscall_64+0x4a/0x90 [ 1428.244581][T11618] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1428.250639][T11618] [ 1428.252947][T11618] read to 0xffff88810786a1ce of 2 bytes by task 11618 on cpu 1: [ 1428.260560][T11618] inet_send_prepare+0x21/0x210 [ 1428.265565][T11618] inet_sendmsg+0x29/0x80 [ 1428.269937][T11618] __sys_sendto+0x2a8/0x370 [ 1428.274430][T11618] __x64_sys_sendto+0x74/0x90 [ 1428.279353][T11618] do_syscall_64+0x4a/0x90 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) 04:15:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000003901000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500f4ffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005106000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:13 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = dup2(r2, r0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f00000000c0)="a2e699f9", 0x4) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) r6 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) sendmsg$nl_xfrm(r3, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@migrate={0xac, 0x21, 0x20, 0x70bd28, 0x25dfdbfe, {{@in=@remote, @in=@dev={0xac, 0x14, 0x14, 0x44}, 0x4e20, 0x7f, 0x4e20, 0x3ff, 0xa, 0x20, 0x0, 0x6c, r5, r7}, 0x6e6bbd, 0x2}, [@algo_auth={0x59, 0x1, {{'sha256-ce\x00'}, 0x88, "b0f4dc06a4fb3238897e0631e816c83a3d"}}]}, 0xac}, 0x1, 0x0, 0x0, 0x6c891657f0ec8baa}, 0x4) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x38, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) [ 1428.283864][T11618] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1428.289764][T11618] [ 1428.292069][T11618] Reported by Kernel Concurrency Sanitizer on: [ 1428.298415][T11618] CPU: 1 PID: 11618 Comm: syz-executor.2 Not tainted 5.13.0-rc1-syzkaller #0 [ 1428.307214][T11618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1428.317367][T11618] ================================================================== 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69", 0x1f}], 0x1) 04:15:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000003a01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 2: unshare(0x74030600) r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="62032fe22ddd"}, 0x14) 04:15:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69", 0x1f}], 0x1) [ 1428.366269][T11628] loop1: detected capacity change from 0 to 264192 [ 1428.375728][T11629] loop5: detected capacity change from 0 to 2048 [ 1428.383398][T11628] EXT4-fs (loop1): bad geometry: block count 1358954624 exceeds size of device (66048 blocks) [ 1428.402400][T11629] EXT4-fs (loop5): Invalid log cluster size: 4294180869 04:15:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000003b01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005206000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500f5ffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7, 0x1f, 0x7, 0x2, 0x0, 0x8, 0x40800, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x506, 0x1, 0x4, 0x2, 0xfff, 0x20, 0x0, 0x0, 0x8, 0x0, 0x3f}, r3, 0x6, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB="48040000", @ANYRES16=r6, @ANYBLOB="0100009e807d38b817747e"], 0x448}}, 0x0) sendfile(r5, r4, 0x0, 0x100007000) 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69", 0x1f}], 0x1) 04:15:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000003c01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf4", 0x22}], 0x1) [ 1428.532123][T11667] loop1: detected capacity change from 0 to 264192 [ 1428.555995][T11667] EXT4-fs (loop1): bad geometry: block count 1375731840 exceeds size of device (66048 blocks) [ 1428.567153][T11671] loop5: detected capacity change from 0 to 2048 04:15:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) [ 1428.603005][T11668] netlink: 1076 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1428.617518][T11671] EXT4-fs (loop5): Invalid log cluster size: 4294246405 [ 1428.628726][T11668] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1428.644751][T11667] loop1: detected capacity change from 0 to 264192 04:15:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500f6ffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000003f01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf4", 0x22}], 0x1) 04:15:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005306000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1428.654989][T11667] EXT4-fs (loop1): bad geometry: block count 1375731840 exceeds size of device (66048 blocks) 04:15:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fbffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x80000) setresuid(0xee00, 0xee01, 0x0) clock_adjtime(0x0, &(0x7f0000000140)={0x2}) 04:15:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf4", 0x22}], 0x1) 04:15:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000004001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1428.730365][T11697] loop5: detected capacity change from 0 to 2048 [ 1428.738535][T11697] EXT4-fs (loop5): Invalid log cluster size: 4294311941 04:15:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000008004001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41b", 0x23}], 0x1) 04:15:13 executing program 2: bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e21}, 0x6e) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x17, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000d5f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000028020000028401001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37373731383437373000"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000002446d29025514b1c8845339908ad0491010000000c00000000000000d5f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000002e00000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d5f4655fd5f4655fd5f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d5f4655fd5f4655fd5f4655f00000000000004000400000000000000050000000800"/64, 0x40, 0x2100}, {&(0x7f0000011700)="20000000500753ed500753ed00000000d5f4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="c041000000380000d5f4655fd5f4655fd5f4655f00000000000002001c0000000000000000000000090000000a0000000b0000000c0000000d0000000e0000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d5f4655f000000000000000000000000000002ea00"/192, 0xc0, 0x2a00}, {&(0x7f0000011900)="ed4100003c000000d5f4655fd5f4655fd5f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000e978bfbe00000000000000000000000000000000000000000000000020000000500753ed500753ed500753edd5f4655f500753ed0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011a00)="ed8100001a040000d5f4655fd5f4655fd5f4655f0000000000000100040000000000000001000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd4e152d00000000000000000000000000000000000000000000000020000000500753ed500753ed500753edd5f4655f500753ed0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011b00)="ffa1000026000000d5f4655fd5f4655fd5f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3737373138343737302f66696c65302f66696c653000000000000000000000000000000000000000000000e528a92800000000000000000000000000000000000000000000000020000000500753ed500753ed500753edd5f4655f500753ed0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011c00)="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", 0x1a0, 0x2e00}, {&(0x7f0000011e00)="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", 0x100, 0x3000}, {&(0x7f0000011f00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000012000)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x4800}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7800}, {&(0x7f0000012700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x8000}], 0x0, &(0x7f0000012c00)) [ 1428.804787][T11712] loop1: detected capacity change from 0 to 264192 [ 1428.823044][T11712] EXT4-fs (loop1): bad geometry: block count 1392509056 exceeds size of device (66048 blocks) 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41b", 0x23}], 0x1) 04:15:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000004201000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005406000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1428.906842][T11730] loop5: detected capacity change from 0 to 2048 [ 1428.924507][T11730] EXT4-fs (loop5): Invalid log cluster size: 4294639621 [ 1428.933719][T11712] loop1: detected capacity change from 0 to 264192 [ 1428.944638][T11712] EXT4-fs (loop1): bad geometry: block count 1392509056 exceeds size of device (66048 blocks) 04:15:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500fdffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8922, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast1, 0x0, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'sit0\x00', r1, 0x2d, 0x6, 0x5, 0x20, 0x3, @mcast1, @empty, 0x7800, 0x80, 0x80000001, 0x400}}) 04:15:13 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41b", 0x23}], 0x1) 04:15:13 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000004801000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:13 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) 04:15:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) [ 1429.053078][T11765] sit0: mtu greater than device maximum [ 1429.064460][T11766] loop5: detected capacity change from 0 to 2048 [ 1429.075169][T11774] loop1: detected capacity change from 0 to 264192 [ 1429.106633][T11785] FAULT_INJECTION: forcing a failure. [ 1429.106633][T11785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1429.120229][T11785] CPU: 1 PID: 11785 Comm: syz-executor.0 Not tainted 5.13.0-rc1-syzkaller #0 [ 1429.129181][T11785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1429.139279][T11785] Call Trace: [ 1429.142807][T11785] dump_stack+0x137/0x19d [ 1429.147358][T11785] should_fail+0x23c/0x250 [ 1429.151809][T11785] should_fail_usercopy+0x16/0x20 04:15:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000004c01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) [ 1429.156847][T11785] _copy_from_user+0x1c/0xd0 [ 1429.161443][T11785] iovec_from_user+0xc4/0x2d0 [ 1429.162899][T11766] EXT4-fs (loop5): Invalid log cluster size: 4294770693 [ 1429.166119][T11785] ? kstrtoull+0x30e/0x350 [ 1429.166145][T11785] __import_iovec+0x49/0x270 [ 1429.184004][T11785] ? do_filp_open+0x17a/0x1f0 [ 1429.188716][T11785] ? fsnotify_perm+0x59/0x2e0 [ 1429.193403][T11785] import_iovec+0x69/0x80 [ 1429.197846][T11785] do_writev+0x107/0x400 [ 1429.202091][T11785] ? __fget_light+0x21b/0x260 04:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000006001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1429.206770][T11785] ? __cond_resched+0x11/0x40 [ 1429.211555][T11785] ? fput+0x2d/0x130 [ 1429.215461][T11785] ? ksys_write+0x157/0x180 [ 1429.220048][T11785] __x64_sys_writev+0x41/0x50 [ 1429.224956][T11785] do_syscall_64+0x4a/0x90 [ 1429.230067][T11785] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1429.236061][T11785] RIP: 0033:0x4665d9 [ 1429.240040][T11785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.259861][T11785] RSP: 002b:00007ff48a223188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1429.268279][T11785] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1429.276261][T11785] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 1429.278007][T11765] sit0: mtu greater than device maximum [ 1429.284235][T11785] RBP: 00007ff48a2231d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.284251][T11785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1429.284260][T11785] R13: 00007fff23befc4f R14: 00007ff48a223300 R15: 0000000000022000 [ 1429.316435][T11774] EXT4-fs (loop1): bad geometry: block count 1409286272 exceeds size of device (66048 blocks) 04:15:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000005506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000016201000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:14 executing program 0 (fault-call:1 fault-nth:1): r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) 04:15:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500feffffff04000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x10, &(0x7f0000000000)=0x9, 0x4) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) close(r2) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)}, 0x100) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000340)={0x1ff, {{0xa, 0x4e20, 0x7fffffff, @private0, 0xfff}}, {{0xa, 0x4e24, 0xd252, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x71}}}, 0x108) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1000001bd) 04:15:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000006801000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1429.363115][T11774] loop1: detected capacity change from 0 to 264192 [ 1429.375358][T11774] EXT4-fs (loop1): bad geometry: block count 1409286272 exceeds size of device (66048 blocks) 04:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000006c01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1429.421361][T11820] loop5: detected capacity change from 0 to 2048 [ 1429.438013][T11830] FAULT_INJECTION: forcing a failure. [ 1429.438013][T11830] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1429.449265][T11820] EXT4-fs (loop5): Invalid log cluster size: 4294836229 [ 1429.451301][T11830] CPU: 1 PID: 11830 Comm: syz-executor.0 Not tainted 5.13.0-rc1-syzkaller #0 04:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, 0x0, 0x0) 04:15:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000007401000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1429.467403][T11830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1429.477867][T11830] Call Trace: [ 1429.481448][T11830] dump_stack+0x137/0x19d [ 1429.485907][T11830] should_fail+0x23c/0x250 [ 1429.490502][T11830] should_fail_usercopy+0x16/0x20 [ 1429.495629][T11830] _copy_from_user+0x1c/0xd0 [ 1429.500219][T11830] sg_write+0x22b/0x8c0 [ 1429.504641][T11830] ? terminate_walk+0x261/0x270 [ 1429.509819][T11830] ? path_openat+0x19ab/0x20b0 [ 1429.514593][T11830] ? avc_policy_seqno+0x22/0x30 04:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, 0x0, 0x0) [ 1429.519734][T11830] ? selinux_file_permission+0x22e/0x530 [ 1429.525461][T11830] ? fsnotify_perm+0x59/0x2e0 [ 1429.530343][T11830] ? security_file_permission+0x87/0xa0 [ 1429.536018][T11830] ? rw_verify_area+0x136/0x250 [ 1429.540977][T11830] do_iter_write+0x2ba/0x4c0 [ 1429.545662][T11830] do_writev+0x1e0/0x400 [ 1429.549987][T11830] ? __cond_resched+0x11/0x40 [ 1429.554828][T11830] ? fput+0x2d/0x130 [ 1429.558770][T11830] ? ksys_write+0x157/0x180 [ 1429.563414][T11830] __x64_sys_writev+0x41/0x50 [ 1429.568173][T11830] do_syscall_64+0x4a/0x90 [ 1429.572589][T11830] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1429.578506][T11830] RIP: 0033:0x4665d9 [ 1429.582620][T11830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.602364][T11830] RSP: 002b:00007ff48a223188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1429.610774][T11830] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 1429.618884][T11830] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 1429.627359][T11830] RBP: 00007ff48a2231d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.636139][T11830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1429.644224][T11830] R13: 00007fff23befc4f R14: 00007ff48a223300 R15: 0000000000022000 04:15:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000006006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:14 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000007601000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:14 executing program 0 (fault-call:1 fault-nth:2): r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) 04:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, 0x0, 0x0) 04:15:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000200000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1429.667051][T11826] loop1: detected capacity change from 0 to 264192 [ 1429.727072][T11862] FAULT_INJECTION: forcing a failure. [ 1429.727072][T11862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1429.740293][T11862] CPU: 0 PID: 11862 Comm: syz-executor.0 Not tainted 5.13.0-rc1-syzkaller #0 [ 1429.744557][T11864] loop5: detected capacity change from 0 to 2048 [ 1429.749091][T11862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1429.749104][T11862] Call Trace: [ 1429.768832][T11862] dump_stack+0x137/0x19d [ 1429.773156][T11862] should_fail+0x23c/0x250 [ 1429.777566][T11862] should_fail_usercopy+0x16/0x20 [ 1429.782671][T11862] _copy_to_user+0x1c/0x90 [ 1429.787148][T11862] simple_read_from_buffer+0xab/0x120 [ 1429.792561][T11862] proc_fail_nth_read+0xf6/0x140 [ 1429.797486][T11862] ? rw_verify_area+0x136/0x250 [ 1429.802417][T11862] ? proc_fault_inject_write+0x200/0x200 [ 1429.808160][T11862] vfs_read+0x154/0x5d0 [ 1429.812432][T11862] ? __fget_light+0x21b/0x260 [ 1429.817124][T11862] ? __cond_resched+0x11/0x40 [ 1429.821942][T11862] ksys_read+0xce/0x180 [ 1429.826078][T11862] __x64_sys_read+0x3e/0x50 [ 1429.830657][T11862] do_syscall_64+0x4a/0x90 [ 1429.835425][T11862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1429.841708][T11862] RIP: 0033:0x41935c [ 1429.845595][T11862] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1429.865530][T11862] RSP: 002b:00007ff48a223170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1429.873974][T11862] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 1429.882578][T11862] RDX: 000000000000000f RSI: 00007ff48a2231e0 RDI: 0000000000000004 [ 1429.890720][T11862] RBP: 00007ff48a2231d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.898967][T11862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1429.907366][T11862] R13: 00007fff23befc4f R14: 00007ff48a223300 R15: 0000000000022000 [ 1429.939742][T11864] EXT4-fs (loop5): blocks per group (512) and clusters per group (16384) inconsistent [ 1429.955572][T11873] loop1: detected capacity change from 0 to 264192 [ 1429.964858][T11873] EXT4-fs (loop1): bad geometry: block count 1610612864 exceeds size of device (66048 blocks) 04:15:15 executing program 2: unshare(0x50040000) set_mempolicy(0x1, 0x0, 0x0) r0 = semget$private(0x0, 0x4, 0x0) unshare(0x300) semop(r0, &(0x7f0000000000)=[{0x1, 0x7fff, 0x1000}, {0x3, 0x9, 0x2800}, {0x0, 0x3, 0x800}, {0x3, 0x20, 0x800}, {0x0, 0x0, 0x800}, {0x0, 0x4, 0x1800}], 0x6) 04:15:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x0) 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000007701000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) 04:15:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000f506000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000700000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff82a0200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000007801000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$unix(r1, &(0x7f00000002c0)=@file={0x0, './bus\x00'}, 0x6e) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x8042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="ec"], 0xe) syz_io_uring_setup(0x1f76, &(0x7f0000000340)={0x0, 0x509e, 0x2, 0x3, 0x13c, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 04:15:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) [ 1430.306630][T11895] loop1: detected capacity change from 0 to 264192 [ 1430.313451][T11898] loop5: detected capacity change from 0 to 2048 [ 1430.342304][T11895] EXT4-fs (loop1): bad geometry: block count 4110418048 exceeds size of device (66048 blocks) 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000007901000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x0) 04:15:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000800000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1430.356701][T11898] EXT4-fs (loop5): blocks per group (1792) and clusters per group (16384) inconsistent 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000007a01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000fe06000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240600005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) [ 1430.437221][T11895] loop1: detected capacity change from 0 to 264192 [ 1430.450047][T11895] EXT4-fs (loop1): bad geometry: block count 4110418048 exceeds size of device (66048 blocks) 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000017a01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x0) 04:15:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240202005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) 04:15:15 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x402000, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xb01001f1}, 0x0) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000001c0)=0x4, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000002c0)=0xc) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f00000000c0)="a2e699f9", 0x4) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000300)={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, r5}, 0xc) recvmmsg(r2, &(0x7f00000020c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002080)=""/1, 0x1}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="d0e191b8f1d0c06e000000", @ANYRES16=r3, @ANYBLOB="08002bbd7000fddbdf25130000001800068004000200080001000400000008000100ff0f0000400004800900010073797a30000000000c00078008000200010100000900010073797a30000000000900010073797a3000000000000007800000030003000000140001800d0001007564703a73797a3100000000100002800800010002000000040004000c00038008000300010000003400078093ff0300f8ffffffffffffff08000100090000000c0003007f0000000000000008000100070000000800020001f8ffff"], 0xd0}}, 0x40) 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000017b01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1430.528777][T11942] loop5: detected capacity change from 0 to 2048 [ 1430.551460][T11942] EXT4-fs (loop5): blocks per group (2048) and clusters per group (16384) inconsistent 04:15:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) 04:15:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000001000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200025a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) 04:15:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000000)="d90e95ab053cc64bccb0955516634c6d3f5767708b9c1e08c7f4c3d8c4dc4d8376ad586ddfc6ae095bafc137384bf77dede32f7ec3e6b0e1c3944dd882", 0x3d, 0x7dff}, {&(0x7f0000000140)="546f31a61cf678ddbe72af690e95ee43d6443da8f6fe1daf204ec45c0905d91b8e30ff08c38d379358972407ca4c3a2e5f4e39d31299540d051b2055d0cc1e138487f706b8db5fc032f557ea363db6eedf79f6facacdb3a7adc95e0f1e0a90ed691aaa438b8a25d443b902ebc580abda1d54e031f5", 0x75}, {&(0x7f0000000040)="3fffb6169b554289b64ba31b39d283ff3e6f62e8cacad935f09ad8cd922fa33e0894fee662cfdc1ab600000000ba343ee327d35535a11c1d100c6f7da630379aebe5e36be02a4106505bdb851f33ff7f0000ad76feeb1b84a0cef4c707d3b51a9e6c0ab34137d8609129207d8e78a0ee9cba2b674a56b99de2caf88d7c5a747b23254c247436bf52713a02145749a53dd6d0569f", 0x94, 0x4}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="4ed4b115d689e18a2ecddd961b343add5e1a66e34563bd506a59c1a32bcc624ec2387b699aa5e66b8eac383efe6355fd3de515ae91be504fc6"]) [ 1430.598755][T11949] loop1: detected capacity change from 0 to 264192 [ 1430.607288][T11964] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 1430.625915][T11949] EXT4-fs (loop1): bad geometry: block count 4261412992 exceeds size of device (66048 blocks) 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000017c01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000007000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) 04:15:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x2a}], 0x1) 04:15:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x20, 0x0, 0x9, 0x0, 0x0, 0xffffffffffff76b8}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) r3 = open(&(0x7f0000000000)='./file0\x00', 0x402, 0x110) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) bind$unix(r3, &(0x7f0000003d00)=@file={0x1, './file0\x00'}, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r2, &(0x7f0000003b80)=[{{&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/190, 0xbe}], 0x1, &(0x7f0000000180)=""/118, 0x76}, 0x2}, {{&(0x7f0000000380)=@un=@abs, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/155, 0x9b}], 0x1, &(0x7f00000004c0)=""/235, 0xeb}, 0x4}, {{&(0x7f00000005c0)=@phonet, 0x80, &(0x7f0000001780)=[{&(0x7f0000000640)=""/248, 0xf8}, {&(0x7f0000000740)=""/48, 0x30}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x3, &(0x7f00000017c0)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f00000027c0)=""/215, 0xd7}, {&(0x7f00000028c0)=""/148, 0x94}, {&(0x7f0000002980)=""/66, 0x42}], 0x3, &(0x7f0000002a40)=""/4096, 0x1000}, 0xfffffffe}, {{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000003a40)=""/43, 0x2b}], 0x1, &(0x7f0000003ac0)=""/122, 0x7a}, 0x99fb}, {{0x0, 0x0, &(0x7f0000003b40)}, 0xfffffff8}], 0x6, 0x2002, 0x0) unshare(0x8000400) 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000017d01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000017e01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1430.733796][T11949] loop1: detected capacity change from 0 to 264192 [ 1430.740739][T11977] loop5: detected capacity change from 0 to 2048 [ 1430.750987][T11977] EXT4-fs (loop5): blocks per group (65536) and clusters per group (16384) inconsistent [ 1430.761374][T11949] EXT4-fs (loop1): bad geometry: block count 4261412992 exceeds size of device (66048 blocks) 04:15:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) 04:15:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000001001000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x20000124}], 0x1) 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000017f01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1430.881459][T12013] loop1: detected capacity change from 0 to 264192 04:15:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) [ 1430.972714][T12029] sg_write: data in/out 512/536871162 bytes for SCSI command 0x0-- guessing data in; [ 1430.972714][T12029] program syz-executor.0 not setting count and/or reply_len properly 04:15:15 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655fffffffffffffff7f01000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1431.066153][T12023] loop5: detected capacity change from 0 to 2048 [ 1431.080264][T12023] EXT4-fs (loop5): blocks per group (69632) and clusters per group (16384) inconsistent [ 1431.094790][T12013] EXT4-fs error (device loop1): ext4_quota_enable:6430: inode #3: comm syz-executor.1: casefold flag without casefold feature 04:15:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000f000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x7ffff000}], 0x1) [ 1431.112422][T12013] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,noblock_validity,,errors=continue. Quota mode: writeback. [ 1431.126975][T12013] ext4 filesystem being mounted at /root/syzkaller-testdir559398582/syzkaller.g9IK0s/5336/file0 supports timestamps until 2038 (0x7fffffff) [ 1431.187867][T12055] sg_write: data in/out 512/2147479510 bytes for SCSI command 0x0-- guessing data in; [ 1431.187867][T12055] program syz-executor.0 not setting count and/or reply_len properly [ 1431.226513][T12060] loop1: detected capacity change from 0 to 264192 [ 1431.239456][T12060] EXT4-fs error (device loop1): ext4_quota_enable:6430: inode #3: comm syz-executor.1: casefold flag without casefold feature [ 1431.252966][T12060] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,noblock_validity,,errors=continue. Quota mode: writeback. [ 1431.267096][T12060] ext4 filesystem being mounted at /root/syzkaller-testdir559398582/syzkaller.g9IK0s/5337/file0 supports timestamps until 2038 (0x7fffffff) 04:15:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000002000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:16 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000008001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0xffffffffffffffff}], 0x1) 04:15:16 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x6, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x3, 0x1, 0xffffff80, 0x7, 0x0, "aa086c35acb071ac7b157ee678550ed2753516"}) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x1) write$binfmt_aout(r1, 0x0, 0x0) timer_create(0x7, &(0x7f0000000040)={0x0, 0x2e, 0x1, @tid=r0}, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(r2, 0x0, &(0x7f0000000140)={{r3, r4+10000000}, {0x77359400}}, &(0x7f0000000180)) tkill(r0, 0x1000000000016) 04:15:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000020000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x8) 04:15:16 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000028001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:16 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000028101000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1431.756274][T12082] loop5: detected capacity change from 0 to 2048 [ 1431.756812][T12081] loop1: detected capacity change from 0 to 264192 [ 1431.789550][T12082] EXT4-fs (loop5): blocks per group (131072) and clusters per group (16384) inconsistent 04:15:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x300) 04:15:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000003000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:16 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000028201000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) [ 1431.818810][T12081] EXT4-fs error (device loop1): ext4_quota_enable:6430: inode #3: comm syz-executor.1: casefold flag without casefold feature 04:15:16 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000040)=""/147, 0x93}], 0x1, 0x53a, 0x3) r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) [ 1431.886790][T12081] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,noblock_validity,,errors=continue. Quota mode: writeback. 04:15:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f001", 0x17}], 0x0, &(0x7f0000000240)) open(&(0x7f0000000040)='./file1\x00', 0x4840, 0x41) r0 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r0, 0x13, 0x1b7, 0x0) 04:15:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000003f000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c0000001000effd000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000080)={[{@usrjquota}, {@noblock_validity}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 04:15:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@mark={0xc}]}, 0xc4}}, 0x0) 04:15:16 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000028301000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) r1 = signalfd4(r0, &(0x7f0000000040)={[0x3]}, 0x8, 0x80000) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 1431.923971][T12081] ext4 filesystem being mounted at /root/syzkaller-testdir559398582/syzkaller.g9IK0s/5338/file0 supports timestamps until 2038 (0x7fffffff) [ 1431.941674][T12114] loop5: detected capacity change from 0 to 2048 [ 1431.967302][T12114] EXT4-fs (loop5): blocks per group (196608) and clusters per group (16384) inconsistent 04:15:16 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000028401000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd", 0x24}], 0x1) r1 = signalfd4(r0, &(0x7f0000000040)={[0x5]}, 0x8, 0x80000) writev(r1, &(0x7f0000000740)=[{&(0x7f00000001c0)="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", 0xfd}, {&(0x7f00000002c0)="315675e671c2dac942a7d2d5b0c21aaab04918c4374fea3bebe4baa36cf42586447ee4ead959a37b7b499329545a4412b05483de77c1a99718e8d1f97151d8aeda65bed5a1fa9fee6de13074b8c3866ed96538f22f1e2a5d00802ca1cedc5167c466a7eaf89d5fa39fdcc2fdca4ca18e950dc10312df9dfbae22cbddc62821d0ba6fe0566eaa6288728818dd5fafdc71f37826fa42b8338b0d72b86260503b1272379787d2b54262373090139df6347b5d7679b63d561b8649c9a7f295319db07132fa89272a09eb6c0c1cdd0a5d2b083838766420eb650467aed6a2392be50b4637f7dbbc99466e6daf", 0xea}, {&(0x7f0000000080)="f523771af544ccc942383d61f31e4ca41d3ebdc790c7951e62629f", 0x1b}, {&(0x7f00000003c0)="4ca41a6d9fac4c6e1df652ef05255d8e006127024747dc3bb01ecef9cdfb6ac4444108452e68a12b982e35555f57a41fa271eabae24ae90ad9682d2e6ddbc9e284e8e320c01d7bbd4c08c075b9146197faab1cc03b29d53bdecb61d2d07a450bf23c8a73df93390e6c252c4440725f7e1c390223df145a6af3af60f75f4b36f7007d858f85a2ab39fd4aac506398f4d05eb815435296a96063edafbc20865a1eedf2ab040a23c2220525cb56d51119b99a7bbb62f708b94a51db21e455928622f443dd3840f12e6da3baa1e4141d41f2f0c1efa6a3d378430b493e61aa00593849e87652982b5594bc8b5e4e39976045", 0xf0}, {&(0x7f00000004c0)="2ab95a371b9ed45b1c7c6c5836b9992fb828d76445b1eb6dc731b536d810fe549022af6f6213dab6a8369c7eb2e919497d58b4512a2f7cfd42dd246145272cfc1f", 0x41}, {&(0x7f0000000540)="01310ca4625d8380efa1cb2abbea1074f9e850d0291b90eb26851e27ce511792612e0fe289b860e73647bdc5c67084419a732db59dbeb434e977e66111b75d7724e7c5c8a8bf8a0689d2777e15d4349739e1b459f810471c2f685255336aea6080dbf7e99bbd45c86988213e841db8ce9b9082180cbda0b2fbecca4412c871caad1aa2856ff5b2d31683e71d49f705cabd5c30781d92785d64e81c64aef2b0d185dc4d1d2a569c361e51a09e609a1bf97286c37cc96f1cb8bc99992388c4d0", 0xbf}, {&(0x7f0000000600)="71cdc185692774e325f5bc8730d3ed59f5efe16645144bcceb36e02a5bd1ed6cdcf459343dd214e26d2a5cc95a26d382ff3fba10e57321ec14ff55c48fab2ce7c9c36bb08d4fb1611c4f743aa4078bcb7445e2c351a2cd93be0ae8837ad80a174ab270d26c8137", 0x67}, {&(0x7f0000000680)="c77a9e85b05781fee7ae15efe8976fbf0d0e4dc0f2b8412783982879792a7f2c907959880f531c1b280063aaa9fabd31605fbe3f71a10fe3c6d4d929a1174c731551e5a7ad889b6da2af1fdcc214a5e17aadf2f3ac67f154e88602aba538773e23a6027f37d247e6c6e15530f050860bfd5e5170bd6cbd27d868c96f5ee16eabea509de9cecf899d81c24b6c", 0x8c}], 0x8) 04:15:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000002000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901", 0x5, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x400000000, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000100)={[{@iocharset={'iocharset', 0x3d, 'cp850'}}]}) mkdirat(r1, &(0x7f0000000080)='./file1\x00', 0x0) [ 1432.060843][T12150] loop1: detected capacity change from 0 to 264192 04:15:16 executing program 4: set_mempolicy(0x3, &(0x7f0000000280)=0x1, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000028501000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000000180)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41800000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000d9f4655fd9f4655fd9f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f00000001c0)="111fc0d901000000803a0900803a09000000000006a1", 0x16, 0x20000}], 0x0, &(0x7f0000000600)=ANY=[]) 04:15:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) [ 1432.110336][T12150] EXT4-fs error (device loop1): ext4_quota_enable:6430: inode #3: comm syz-executor.1: casefold flag without casefold feature [ 1432.129930][T12150] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,noblock_validity,,errors=continue. Quota mode: writeback. 04:15:17 executing program 3 (fault-call:4 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) 04:15:17 executing program 2: open$dir(&(0x7f0000000080)='./file0\x00', 0x481004, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) [ 1432.152919][T12150] ext4 filesystem being mounted at /root/syzkaller-testdir559398582/syzkaller.g9IK0s/5339/file0 supports timestamps until 2038 (0x7fffffff) 04:15:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000040000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022"