0000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000246300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000007000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 546.111482][T18890] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 546.179501][T18906] EXT4-fs (loop2): inodes count not valid: 335544352 vs 32 [ 546.264504][T18915] EXT4-fs (loop4): inodes count not valid: 603979808 vs 32 [ 546.283818][T18914] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 546.292198][T18914] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:22:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000f001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000156300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000256300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000008000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0018001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e001f001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:57 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000266300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 546.954332][T18927] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 546.971607][T18924] EXT4-fs (loop4): inodes count not valid: 620757024 vs 32 [ 546.974135][T18927] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 546.978999][T18928] EXT4-fs (loop2): inodes count not valid: 352321568 vs 32 [ 547.151818][T18947] EXT4-fs (loop4): inodes count not valid: 637534240 vs 32 22:22:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:22:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000009000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0020001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0200001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000166300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000276300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0026001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0300001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e003f001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000176300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0400001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000a000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 547.896761][T18957] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 547.898368][T18958] EXT4-fs (loop2): inodes count not valid: 369098784 vs 32 [ 547.914628][T18957] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 547.923996][T18956] EXT4-fs (loop4): inodes count not valid: 654311456 vs 32 [ 548.139416][T18973] EXT4-fs (loop2): inodes count not valid: 385876000 vs 32 [ 548.175630][T18978] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 548.184027][T18978] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:22:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0040001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0500001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000186300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:59 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000286300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000b000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0041001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0600001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0069001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0800001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:22:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000196300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 548.946962][T18987] EXT4-fs (loop2): inodes count not valid: 402653216 vs 32 [ 548.967255][T18992] EXT4-fs (loop4): inodes count not valid: 671088672 vs 32 22:22:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0f00001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 549.025840][T18995] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 549.041228][T18995] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 549.161994][T19013] EXT4-fs (loop2): inodes count not valid: 419430432 vs 32 22:23:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00?\x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e1800001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000c000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:00 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000296300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:00 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000001a6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e2600001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00@\x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e4100001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:00 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002a6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0002001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 549.862436][T19024] EXT4-fs (loop4): inodes count not valid: 687865888 vs 32 22:23:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0003001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 549.907808][T19023] EXT4-fs (loop2): inodes count not valid: 436207648 vs 32 [ 549.928763][T19025] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 549.944706][T19025] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:23:01 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002b6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0004001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000001b6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e6900001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000d000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0402001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0005001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0006001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0003001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0008001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0204001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 550.765384][T19056] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 550.775057][T19056] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 550.786184][T19050] EXT4-fs (loop4): inodes count not valid: 721420320 vs 32 [ 550.800024][T19058] EXT4-fs (loop2): inodes count not valid: 452984864 vs 32 22:23:01 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002c6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000f001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000e000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:01 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000001c6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 550.951302][T19084] EXT4-fs (loop2): inodes count not valid: 469762080 vs 32 [ 550.958799][T19080] EXT4-fs (loop4): inodes count not valid: 738197536 vs 32 [ 550.966099][T19087] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 550.981165][T19087] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:23:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0018001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0604001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000001d6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002d6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000f000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0026001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0005001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000001e6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 551.678044][T19096] EXT4-fs (loop2): inodes count not valid: 486539296 vs 32 [ 551.693836][T19099] EXT4-fs (loop4): inodes count not valid: 754974752 vs 32 22:23:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0041001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0006001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0069001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0406001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0004021300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 551.720025][T19093] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 551.728667][T19093] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:23:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000f001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:02 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002e6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 551.810964][T19124] EXT4-fs (loop2): inodes count not valid: 503316512 vs 32 [ 551.812156][T19127] EXT4-fs (loop4): inodes count not valid: 771751968 vs 32 22:23:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:03 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000031300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0018001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000010000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002f6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000216300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e001f001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0002041300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000226300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0020001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000306300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 552.566637][T19132] EXT4-fs (loop2): inodes count not valid: 553648160 vs 32 [ 552.574662][T19140] EXT4-fs (loop4): inodes count not valid: 788529184 vs 32 22:23:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0026001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 552.618503][T19139] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 552.631655][T19139] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 552.697534][T19152] EXT4-fs (loop4): inodes count not valid: 805306400 vs 32 22:23:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:03 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000236300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0006041300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000011000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000316300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e003f001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000051300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0040001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000326300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0041001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 553.511910][T19163] EXT4-fs (loop4): inodes count not valid: 822083616 vs 32 [ 553.534429][T19170] EXT4-fs (loop2): inodes count not valid: 587202592 vs 32 22:23:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000061300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0069001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 553.585100][T19168] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 553.602514][T19168] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 553.643878][T19182] EXT4-fs (loop4): inodes count not valid: 838860832 vs 32 22:23:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0004061300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00 \x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000336300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000246300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000012000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000f1300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00?\x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000181300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00@\x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000256300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00001f1300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 554.406624][T19196] EXT4-fs (loop4): inodes count not valid: 855638048 vs 32 [ 554.418548][T19198] EXT4-fs (loop2): inodes count not valid: 603979808 vs 32 [ 554.460879][T19203] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 554.471356][T19203] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 554.505461][T19220] EXT4-fs (loop2): inodes count not valid: 620757024 vs 32 22:23:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0002001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000201300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000014000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000346300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000266300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0003001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000261300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00003f1300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000356300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0004001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:05 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000401300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 555.323684][T19230] EXT4-fs (loop4): inodes count not valid: 872415264 vs 32 [ 555.355872][T19234] EXT4-fs (loop2): inodes count not valid: 637534240 vs 32 [ 555.377412][T19232] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 555.389063][T19232] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 555.462094][T19248] EXT4-fs (loop4): inodes count not valid: 889192480 vs 32 22:23:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:06 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000411300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0005001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000018000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:06 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000276300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:06 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000366300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:06 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000691300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0006001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 556.223106][T19263] EXT4-fs (loop4): inodes count not valid: 905969696 vs 32 [ 556.252583][T19265] EXT4-fs (loop1): revision level too high, forcing read-only mode 22:23:06 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000021300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0008001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:06 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000376300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:06 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000031300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 556.271243][T19268] EXT4-fs (loop2): inodes count not valid: 654311456 vs 32 [ 556.277168][T19265] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 556.364968][T19284] EXT4-fs (loop4): inodes count not valid: 922746912 vs 32 22:23:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000f001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000020000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000041300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000286300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000386300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0018001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000051300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0026001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0041001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000040000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:07 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000061300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 557.186541][T19298] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 557.201193][T19297] EXT4-fs (loop2): inodes count not valid: 671088672 vs 32 [ 557.209395][T19298] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 557.218742][T19299] EXT4-fs (loop4): inodes count not valid: 939524128 vs 32 [ 557.377181][T19315] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 557.389310][T19315] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:23:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:08 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0069001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:08 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000396300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:08 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000081300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:08 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000296300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000041000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:08 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000f1300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:08 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0004021300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:08 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000181300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 558.227037][T19327] EXT4-fs (loop2): inodes count not valid: 687865888 vs 32 [ 558.252610][T19332] EXT4-fs (loop4): inodes count not valid: 956301344 vs 32 [ 558.258119][T19333] EXT4-fs (loop1): revision level too high, forcing read-only mode 22:23:08 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000261300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:08 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000031300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:08 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0002041300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 558.271650][T19333] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:23:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000637ffffffd000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000411300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0006041300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002a6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:09 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003a6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000691300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000051300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000061300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00?\x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002b6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 559.181440][T19360] EXT4-fs (loop2): inodes count not valid: 704643104 vs 32 [ 559.198296][T19362] EXT4-fs (loop1): bad geometry: block count 4294934371 exceeds size of device (132096 blocks) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00@\x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 559.234416][T19361] EXT4-fs (loop4): inodes count not valid: 973078560 vs 32 22:23:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000637fffffff000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0004061300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001302000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003b6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001303000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000f1300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 559.293923][T19376] EXT4-fs (loop2): inodes count not valid: 721420320 vs 32 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001304000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:09 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003c6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002c6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001305000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 559.348440][T19389] EXT4-fs (loop4): inodes count not valid: 989855776 vs 32 [ 559.371374][T19392] EXT4-fs (loop1): bad geometry: block count 4294934371 exceeds size of device (132096 blocks) 22:23:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000181300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003d6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001306000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001308000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00001f1300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000201300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000000130f000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000261300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 559.443432][T19410] EXT4-fs (loop2): inodes count not valid: 738197536 vs 32 [ 559.459963][T19417] EXT4-fs (loop4): inodes count not valid: 1023410208 vs 32 22:23:10 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002d6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001318000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00003f1300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003e6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 559.571473][T19433] EXT4-fs (loop1): inodes count not valid: 32 vs 544 [ 559.671469][T19446] EXT4-fs (loop2): inodes count not valid: 754974752 vs 32 [ 559.683675][T19445] EXT4-fs (loop4): inodes count not valid: 1040187424 vs 32 22:23:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300040005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001326000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000401300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002e6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000416300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001341000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000411300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001369000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000691300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001304020023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000021300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 560.318285][T19452] EXT4-fs (loop2): inodes count not valid: 771751968 vs 32 [ 560.327370][T19458] EXT4-fs (loop1): bad geometry: block count 262243 exceeds size of device (132096 blocks) [ 560.342474][T19460] EXT4-fs (loop4): inodes count not valid: 1090519072 vs 32 22:23:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:11 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300030023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000031300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300050005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000486300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000002f6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000041300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001302040023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000306300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001306040023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000316300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:11 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000326300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 561.192755][T19484] EXT4-fs (loop2): inodes count not valid: 788529184 vs 32 [ 561.217404][T19491] EXT4-fs (loop1): bad geometry: block count 327779 exceeds size of device (132096 blocks) [ 561.228541][T19488] EXT4-fs (loop4): inodes count not valid: 1207959584 vs 32 [ 561.437570][T19507] EXT4-fs (loop2): inodes count not valid: 838860832 vs 32 22:23:12 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300050023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000051300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000004c6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300060005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:12 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000336300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000061300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300070005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300060023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000081300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 562.068265][T19513] EXT4-fs (loop1): bad geometry: block count 393315 exceeds size of device (132096 blocks) [ 562.100927][T19522] EXT4-fs (loop4): inodes count not valid: 1275068448 vs 32 [ 562.108765][T19518] EXT4-fs (loop2): inodes count not valid: 855638048 vs 32 22:23:12 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000346300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001304060023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000f1300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000013000f0023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000181300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:12 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000606300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 562.223081][T19541] EXT4-fs (loop2): inodes count not valid: 872415264 vs 32 [ 562.233577][T19532] EXT4-fs (loop1): bad geometry: block count 458851 exceeds size of device (132096 blocks) [ 562.337482][T19548] EXT4-fs (loop4): inodes count not valid: 1610612768 vs 32 22:23:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300180023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000261300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300080005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000356300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000636300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000013001f0023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000411300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300090005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000686300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300200023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300260023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 562.949328][T19556] EXT4-fs (loop1): bad geometry: block count 524387 exceeds size of device (132096 blocks) [ 562.959852][T19561] EXT4-fs (loop4): inodes count not valid: 1660944416 vs 32 [ 562.984763][T19562] EXT4-fs (loop2): inodes count not valid: 889192480 vs 32 [ 563.147587][T19573] EXT4-fs (loop1): bad geometry: block count 589923 exceeds size of device (132096 blocks) [ 563.158517][T19579] EXT4-fs (loop4): inodes count not valid: 1744830496 vs 32 22:23:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:14 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000691300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000013003f0023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000366300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000006c6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300400023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00 \x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00?\x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300410023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000376300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300690023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 563.893688][T19591] EXT4-fs (loop1): bad geometry: block count 655459 exceeds size of device (132096 blocks) [ 563.905384][T19592] EXT4-fs (loop2): inodes count not valid: 905969696 vs 32 [ 563.912748][T19593] EXT4-fs (loop4): inodes count not valid: 1811939360 vs 32 [ 564.077593][T19611] EXT4-fs (loop2): inodes count not valid: 922746912 vs 32 22:23:15 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)='.\x00\x00\x00@\x00\x00\x00#', 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000000130000003f", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000b0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000746300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000386300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001302000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000040", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001303000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000c0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300020023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001304000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 564.872771][T19622] EXT4-fs (loop2): inodes count not valid: 939524128 vs 32 [ 564.880054][T19624] EXT4-fs (loop1): bad geometry: block count 720995 exceeds size of device (132096 blocks) [ 564.892725][T19626] EXT4-fs (loop4): inodes count not valid: 1946157088 vs 32 22:23:15 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:15 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000396300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300030023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001305000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000d0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000007a6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 565.045668][T19637] EXT4-fs (loop1): bad geometry: block count 786531 exceeds size of device (132096 blocks) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300040023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001306000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300050023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300060023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001308000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000000130f000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 565.122857][T19651] EXT4-fs (loop2): inodes count not valid: 956301344 vs 32 [ 565.132510][T19655] EXT4-fs (loop1): bad geometry: block count 852067 exceeds size of device (132096 blocks) [ 565.158159][T19654] EXT4-fs (loop4): inodes count not valid: 2046820384 vs 32 22:23:15 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300080023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001318000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000826300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000e0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003a6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000013000f0023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001326000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300180023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000c96300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 565.305071][T19682] EXT4-fs (loop4): inodes count not valid: 2181038112 vs 32 [ 565.324633][T19685] EXT4-fs (loop1): bad geometry: block count 917603 exceeds size of device (132096 blocks) [ 565.334713][T19680] EXT4-fs (loop2): inodes count not valid: 973078560 vs 32 22:23:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000f0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300260023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001341000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300410023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003b6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300690023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001369000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006400000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300040223", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001304020023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:15 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003c6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 565.450098][T19709] EXT4-fs (loop2): inodes count not valid: 989855776 vs 32 [ 565.537906][T19702] EXT4-fs (loop1): bad geometry: block count 983139 exceeds size of device (132096 blocks) [ 565.557416][T19712] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 565.565854][T19712] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300100005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000323", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300030023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:16 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003d6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300020423", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 565.648241][T19728] EXT4-fs (loop2): inodes count not valid: 1006632992 vs 32 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300060423", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001302040023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300110005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000523", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001306040023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 565.688614][T19739] EXT4-fs (loop1): bad geometry: block count 1048675 exceeds size of device (132096 blocks) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300050023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300040623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300060023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000003e6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 565.770625][T19742] EXT4-fs (loop2): inodes count not valid: 1023410208 vs 32 [ 565.803291][T19745] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 565.812235][T19745] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 565.823256][T19768] EXT4-fs (loop1): bad geometry: block count 1114211 exceeds size of device (132096 blocks) 22:23:16 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006900000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000f23", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001304060023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300120005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000416300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000013000f0023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300001823", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300180023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300001f23", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 565.964251][T19786] EXT4-fs (loop1): bad geometry: block count 1179747 exceeds size of device (132096 blocks) [ 565.980649][T19782] EXT4-fs (loop2): inodes count not valid: 1090519072 vs 32 [ 565.992931][T19787] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:16 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000486300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000013001f0023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.019510][T19787] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:16 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006c00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300002023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300140005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300200023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300002623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000004c6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300260023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300003f23", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000013003f0023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.181190][T19802] EXT4-fs (loop2): inodes count not valid: 1207959584 vs 32 [ 566.210841][T19808] EXT4-fs (loop1): bad geometry: block count 1310819 exceeds size of device (132096 blocks) 22:23:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300004023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300400023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.300918][T19826] EXT4-fs (loop2): inodes count not valid: 1275068448 vs 32 [ 566.319031][T19814] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 566.329174][T19814] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:16 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006f00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300160005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000606300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300004123", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300410023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300690023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300006923", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000000130000003f", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:16 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000636300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.424078][T19839] EXT4-fs (loop1): bad geometry: block count 1441891 exceeds size of device (132096 blocks) [ 566.435352][T19841] EXT4-fs (loop2): inodes count not valid: 1610612768 vs 32 22:23:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000223", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300170005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000040", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.497010][T19851] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 566.506176][T19851] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:17 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007000000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:17 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000686300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000323", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300020023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300030023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000423", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.568629][T19865] EXT4-fs (loop1): bad geometry: block count 1507427 exceeds size of device (132096 blocks) 22:23:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000523", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300180005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300040023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300050023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.613607][T19870] EXT4-fs (loop2): inodes count not valid: 1744830496 vs 32 [ 566.648898][T19877] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.663600][T19877] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:17 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000006c6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000823", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300060023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300080023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000f23", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300190005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000746300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.779341][T19892] EXT4-fs (loop1): bad geometry: block count 1572963 exceeds size of device (132096 blocks) [ 566.813690][T19900] EXT4-fs (loop2): inodes count not valid: 1811939360 vs 32 22:23:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300001823", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e00000013000f0023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300180023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007400000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300002623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300260023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.838558][T19905] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 566.847482][T19905] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300410023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 566.930730][T19924] EXT4-fs (loop1): bad geometry: block count 1638499 exceeds size of device (132096 blocks) [ 567.022701][T19933] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 567.032208][T19933] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300004123", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:18 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300690023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300220005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:18 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000007a6300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:18 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007500000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300006923", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:18 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300040223", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000000130000003f", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:18 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000323", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:18 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000c96300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 567.661644][T19941] EXT4-fs (loop1): bad geometry: block count 2228323 exceeds size of device (132096 blocks) [ 567.685917][T19945] EXT4-fs (loop2): inodes count not valid: 2046820384 vs 32 22:23:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000040", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 567.738248][T19948] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 567.750351][T19948] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 567.875244][T19967] EXT4-fs (loop2): inodes count not valid: 3372220448 vs 32 22:23:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300250005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300020423", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006400000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300060423", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063002e0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300360005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000523", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 568.543200][T19973] EXT4-fs (loop1): bad geometry: block count 2424931 exceeds size of device (132096 blocks) [ 568.572277][T19979] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 568.600728][T19979] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 568.600923][T19972] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 568.627836][T19972] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 568.714657][T19999] EXT4-fs (loop1): bad geometry: block count 3539043 exceeds size of device (132096 blocks) 22:23:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007a00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300410005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300040623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000f23", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 569.437874][T20009] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 569.449571][T20012] EXT4-fs (loop1): bad geometry: block count 4259939 exceeds size of device (132096 blocks) [ 569.464044][T20011] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 569.468758][T20009] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300480005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006900000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 569.473986][T20011] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:20 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300001823", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000004000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 569.602172][T20033] EXT4-fs (loop1): bad geometry: block count 4718691 exceeds size of device (132096 blocks) [ 569.635230][T20032] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 569.645965][T20032] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 569.655684][T20042] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 569.667492][T20042] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300001f23", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063004c0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006c00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:20 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000a00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300002023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000001100000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 570.337705][T20053] EXT4-fs (loop4): bad geometry: first data block 17 is beyond end of filesystem (10) [ 570.376287][T20057] EXT4-fs (loop1): bad geometry: block count 4980835 exceeds size of device (132096 blocks) 22:23:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300002623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300003f23", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 570.388593][T20052] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 570.396855][T20052] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300600005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300004023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 570.507151][T20065] EXT4-fs (loop4): bad geometry: first data block 17 is beyond end of filesystem (17) [ 570.553162][T20085] EXT4-fs (loop1): bad geometry: block count 6291555 exceeds size of device (132096 blocks) 22:23:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006f00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300004123", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002200000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300630005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300006923", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 571.240409][T20096] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 571.255853][T20096] EXT4-fs (loop4): group descriptors corrupted! [ 571.263663][T20097] EXT4-fs (loop1): bad geometry: block count 6488163 exceeds size of device (132096 blocks) 22:23:21 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000223", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300680005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 571.288046][T20098] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 571.315256][T20098] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 571.403937][T20117] EXT4-fs (loop1): bad geometry: block count 6815843 exceeds size of device (132096 blocks) 22:23:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:22 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000323", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063006c0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:22 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:22 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007000000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:22 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000423", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:22 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000523", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 572.151166][T20126] EXT4-fs (loop1): bad geometry: block count 7077987 exceeds size of device (132096 blocks) [ 572.176780][T20130] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! 22:23:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300740005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 572.201084][T20131] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 572.204077][T20130] EXT4-fs (loop4): group descriptors corrupted! [ 572.215709][T20131] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 572.266539][T20148] EXT4-fs (loop1): bad geometry: block count 7602275 exceeds size of device (132096 blocks) 22:23:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:23 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002500000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:23 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063007a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000823", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000f23", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 573.050163][T20160] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 573.059906][T20162] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 573.072043][T20162] EXT4-fs (loop4): group descriptors corrupted! [ 573.083306][T20161] EXT4-fs (loop1): bad geometry: block count 7995491 exceeds size of device (132096 blocks) 22:23:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300001823", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 573.090773][T20160] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:24 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300002623", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002a00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007400000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300820005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300004123", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002b00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300006923", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:24 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 573.930331][T20188] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 573.941573][T20188] EXT4-fs (loop4): group descriptors corrupted! [ 573.952279][T20194] EXT4-fs (loop1): bad geometry: block count 8519779 exceeds size of device (132096 blocks) [ 573.996165][T20192] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 574.011411][T20192] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 574.131155][T20212] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 574.195511][T20212] EXT4-fs (loop4): group descriptors corrupted! 22:23:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e000000130000003f", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007500000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300c90005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002c00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000040", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300280105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 574.782556][T20221] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 574.795356][T20225] EXT4-fs (loop1): bad geometry: block count 13172835 exceeds size of device (132096 blocks) [ 574.804743][T20221] EXT4-fs (loop4): group descriptors corrupted! 22:23:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 574.841260][T20226] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 574.850217][T20226] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002d00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300390105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 574.962954][T20251] EXT4-fs (loop1): bad geometry: block count 19398755 exceeds size of device (132096 blocks) 22:23:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 575.028250][T20264] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 575.063358][T20263] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 575.065665][T20264] EXT4-fs (loop4): group descriptors corrupted! 22:23:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002e00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300790105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 575.086033][T20263] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 575.095600][T20268] EXT4-fs (loop1): bad geometry: block count 20512867 exceeds size of device (132096 blocks) 22:23:25 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007a00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000020000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000030000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41020000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 575.254792][T20291] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 575.265358][T20289] EXT4-fs (loop1): bad geometry: block count 24707171 exceeds size of device (132096 blocks) [ 575.293366][T20291] EXT4-fs (loop4): group descriptors corrupted! 22:23:25 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000003000000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41030000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 575.351262][T20302] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 575.370973][T20302] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:25 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000004000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300880105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41040000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41050000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41060000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41080000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 575.438149][T20321] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 575.462115][T20321] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 575.471164][T20330] EXT4-fs (loop1): bad geometry: block count 25690211 exceeds size of device (132096 blocks) [ 575.518736][T20336] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 575.539092][T20336] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:26 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004c00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300b80105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000a00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410f0000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41180000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41260000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41410000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 575.683249][T20354] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 575.692271][T20354] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 575.708965][T20351] EXT4-fs (loop1): bad geometry: block count 28835939 exceeds size of device (132096 blocks) 22:23:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x10, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300040205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000005800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41690000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000001100000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41040200040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 575.764721][T20364] EXT4-fs (loop2): bad geometry: first data block 17 is beyond end of filesystem (10) 22:23:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000300040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41020400040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41060400040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 575.874946][T20388] EXT4-fs (loop1): bad geometry: block count 33816675 exceeds size of device (132096 blocks) [ 575.895158][T20396] EXT4-fs (loop2): bad geometry: first data block 17 is beyond end of filesystem (17) [ 575.910041][T20382] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 575.919058][T20382] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000500040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300110205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002200000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x10, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:27 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006400000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 576.681944][T20417] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 576.682369][T20422] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 576.700162][T20417] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 576.702676][T20414] EXT4-fs (loop1): bad geometry: block count 34668643 exceeds size of device (132096 blocks) 22:23:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300160205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41040600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000f00040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41001800040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 576.734508][T20422] EXT4-fs (loop2): group descriptors corrupted! 22:23:27 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 576.939689][T20447] EXT4-fs (loop1): bad geometry: block count 34996323 exceeds size of device (132096 blocks) [ 576.952494][T20446] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 576.975688][T20446] EXT4-fs (loop2): group descriptors corrupted! 22:23:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x10, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41001f00040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:28 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:28 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002500000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41002000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 577.804195][T20461] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 577.817336][T20463] EXT4-fs (loop1): bad geometry: block count 50331747 exceeds size of device (132096 blocks) 22:23:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41002600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41003f00040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 577.866412][T20459] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 577.884925][T20459] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 577.898879][T20461] EXT4-fs (loop2): group descriptors corrupted! 22:23:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41004000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:29 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300040305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:29 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006900000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:29 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002a00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41004100040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:29 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 578.712138][T20491] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 578.718966][T20493] EXT4-fs (loop1): bad geometry: block count 50593891 exceeds size of device (132096 blocks) [ 578.745579][T20491] EXT4-fs (loop2): group descriptors corrupted! 22:23:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41006900040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:29 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000050000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:29 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 578.760206][T20495] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 578.772425][T20495] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:30 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000090000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002b00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006c00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300450305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000c0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000100000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:30 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 579.685387][T20519] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 579.714047][T20526] EXT4-fs (loop1): bad geometry: block count 54853731 exceeds size of device (132096 blocks) [ 579.724465][T20521] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 579.748211][T20521] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 579.757788][T20519] EXT4-fs (loop2): group descriptors corrupted! 22:23:31 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000020000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000200000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300810305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006f00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:31 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002c00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000003f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000030000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 580.702714][T20552] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 580.738205][T20556] EXT4-fs (loop1): bad geometry: block count 58785891 exceeds size of device (132096 blocks) 22:23:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000400000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 580.746271][T20552] EXT4-fs (loop2): group descriptors corrupted! 22:23:31 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41020000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000880000000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063008b0305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002d00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000200040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:31 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41030000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 580.792309][T20557] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 580.818855][T20557] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 580.889919][T20580] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 580.900248][T20581] EXT4-fs (loop1): bad geometry: block count 59441251 exceeds size of device (132096 blocks) 22:23:31 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007000000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 580.935682][T20580] EXT4-fs (loop2): group descriptors corrupted! [ 581.083342][T20587] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 581.101166][T20587] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:32 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41040000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:32 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000300040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300c00305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:32 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000002e00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:32 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:32 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41050000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:32 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000400040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:32 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41060000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 581.638800][T20597] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 46)! [ 581.664610][T20599] EXT4-fs (loop1): bad geometry: block count 62914659 exceeds size of device (132096 blocks) [ 581.678292][T20597] EXT4-fs (loop2): group descriptors corrupted! 22:23:32 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000500040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:32 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41080000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:32 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000003000000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 581.687268][T20598] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 581.708883][T20598] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 581.799128][T20616] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 581.813933][T20616] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:33 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410f0000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300e60305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007400000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000004c00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41180000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000800040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41260000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41410000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000f00040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:33 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41690000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 582.599739][T20627] EXT4-fs (loop1): bad geometry: block count 65405027 exceeds size of device (132096 blocks) [ 582.661024][T20629] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 582.661031][T20632] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 582.661434][T20632] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 582.672891][T20629] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41040200040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41001800040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300020405000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000005800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007500000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000300040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41002600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41020400040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41004100040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 583.568874][T20659] EXT4-fs (loop1): bad geometry: block count 67240035 exceeds size of device (132096 blocks) [ 583.594477][T20663] EXT4-fs (loop2): revision level too high, forcing read-only mode 22:23:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41060400040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300030405000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41006900040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300060405000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000500040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 583.611176][T20663] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 583.621486][T20665] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 583.640069][T20665] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:34 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006400000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000402040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 583.776236][T20693] EXT4-fs (loop1): bad geometry: block count 67502179 exceeds size of device (132096 blocks) [ 583.806459][T20692] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 583.818937][T20692] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:34 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000003040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300100405000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41040600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000204040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000f00040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000604040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 584.477764][T20704] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 584.488573][T20712] EXT4-fs (loop1): bad geometry: block count 68157539 exceeds size of device (132096 blocks) [ 584.496616][T20704] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:35 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41001800040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000505000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 584.531333][T20710] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 584.548512][T20710] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 584.704021][T20731] EXT4-fs (loop1): bad geometry: block count 83886179 exceeds size of device (132096 blocks) 22:23:35 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41001f00040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000005040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007a00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000605000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006900000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000006040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41002000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000406040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000f040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 585.383848][T20741] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 585.395228][T20743] EXT4-fs (loop1): bad geometry: block count 100663395 exceeds size of device (132096 blocks) [ 585.418884][T20741] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000018040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41002600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100001f040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000020040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 585.435070][T20738] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 585.454942][T20738] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:36 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000004020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 585.597862][T20769] EXT4-fs (loop4): inodes count not valid: 32 vs 544 22:23:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:36 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41003f00040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:36 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000026040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300040605000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:36 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006c00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:36 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001000000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:36 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41004000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:36 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100003f040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:36 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41004100040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 586.294242][T20776] EXT4-fs (loop1): bad geometry: block count 100925539 exceeds size of device (132096 blocks) [ 586.321309][T20781] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 586.329689][T20784] EXT4-fs (loop4): bad geometry: block count 268435555 exceeds size of device (132096 blocks) 22:23:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000705000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:36 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41006900040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:36 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000040040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 586.365197][T20781] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 586.459771][T20795] EXT4-fs (loop1): bad geometry: block count 117440611 exceeds size of device (132096 blocks) 22:23:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, 0x0, 0x0, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:37 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000041040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:37 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006f00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:37 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000050000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:37 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000001000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000905000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:37 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000069040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:37 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000090000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 587.160529][T20807] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 587.169469][T20807] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 587.183863][T20812] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 587.200161][T20812] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:37 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007000000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:37 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000030000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:37 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000c0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000a05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 587.204885][T20816] EXT4-fs (loop1): bad geometry: block count 150995043 exceeds size of device (132096 blocks) [ 587.388291][T20831] EXT4-fs (loop1): bad geometry: block count 167772259 exceeds size of device (132096 blocks) [ 587.392804][T20825] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 587.411318][T20825] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, 0x0, 0x0, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:38 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000002000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000002040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000b05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007300000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000003040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000100000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300ce0b05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000004040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000170000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:38 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000005040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 588.021180][T20846] EXT4-fs (loop1): bad geometry: block count 184549475 exceeds size of device (132096 blocks) [ 588.032045][T20841] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 588.052234][T20841] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 588.061221][T20845] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 588.086292][T20845] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 588.228983][T20861] EXT4-fs (loop1): bad geometry: block count 198049891 exceeds size of device (132096 blocks) 22:23:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, 0x0, 0x0, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:39 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000180000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:39 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000003000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:39 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007400000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300cf0b05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:39 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000006040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:39 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000200000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:39 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000008040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:39 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000003f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:39 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000f040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 588.877262][T20872] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 588.899108][T20872] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 588.911608][T20876] EXT4-fs (loop1): bad geometry: block count 198115427 exceeds size of device (132096 blocks) 22:23:39 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000400000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:39 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000018040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 588.934200][T20873] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 588.972289][T20873] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:40 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007500000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000c05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000880000000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000026040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000004000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000041040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000200040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000300040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000069040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000400040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:40 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000050000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 589.738837][T20903] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 589.748437][T20903] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 589.758276][T20905] EXT4-fs (loop1): bad geometry: block count 201326691 exceeds size of device (132096 blocks) [ 589.834919][T20909] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 589.843355][T20909] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000500040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:41 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006302000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000090000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:41 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007800000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000d05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000c0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000e05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 590.680769][T20939] EXT4-fs (loop1): bad geometry: block count 218103907 exceeds size of device (132096 blocks) [ 590.696368][T20934] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000800040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000f00040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 590.728873][T20937] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 590.737160][T20937] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 590.747487][T20934] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 590.770246][T20956] EXT4-fs (loop1): bad geometry: block count 234881123 exceeds size of device (132096 blocks) 22:23:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41001800040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000f05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006303000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000007a00000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000200000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000003f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41002600040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41004100040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41006900040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 591.642679][T20969] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 591.653762][T20972] EXT4-fs (loop1): bad geometry: block count 251658339 exceeds size of device (132096 blocks) 22:23:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000402040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000003040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:42 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000400000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 591.704720][T20965] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 591.717542][T20969] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 591.727923][T20965] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000204040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000008008d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300041005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000004020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000020000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000604040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000030000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000005040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300201005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001000000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 592.545186][T20997] EXT4-fs (loop1): bad geometry: block count 268697699 exceeds size of device (132096 blocks) [ 592.562393][T21005] EXT4-fs (loop2): inodes count not valid: 32 vs 544 [ 592.614295][T21003] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 592.624021][T21003] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 592.721795][T21020] EXT4-fs (loop1): bad geometry: block count 270532707 exceeds size of device (132096 blocks) [ 592.723963][T21023] EXT4-fs (loop2): bad geometry: block count 268435555 exceeds size of device (132096 blocks) 22:23:43 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000050000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000006040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006305000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:43 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000001000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000090000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000406040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000c0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000f040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300021105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000018040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 593.462330][T21036] EXT4-fs (loop1): bad geometry: block count 285212771 exceeds size of device (132096 blocks) [ 593.477711][T21030] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 593.488894][T21030] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:44 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100001f040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 593.517499][T21037] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 593.525955][T21037] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:44 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006306000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000020040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 593.654020][T21055] EXT4-fs (loop1): bad geometry: block count 285343843 exceeds size of device (132096 blocks) [ 593.697354][T21066] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 593.705743][T21066] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:44 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000100000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000002000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000026040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006307000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100003f040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040200d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001405000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 594.397158][T21078] EXT4-fs (loop1): bad geometry: block count 301989987 exceeds size of device (132096 blocks) [ 594.413617][T21075] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 594.422674][T21079] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:44 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000040040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001605000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:44 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040300d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 594.445782][T21075] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 594.457168][T21079] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 594.509603][T21097] EXT4-fs (loop1): bad geometry: block count 369098851 exceeds size of device (132096 blocks) 22:23:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:45 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000041040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:45 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000003000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:45 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040400d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300021605000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:45 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006308000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:45 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040500d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:45 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000069040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001705000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:45 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040600d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 595.266483][T21107] EXT4-fs (loop1): bad geometry: block count 369229923 exceeds size of device (132096 blocks) [ 595.298138][T21111] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:45 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000030000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:45 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040800d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 595.327577][T21110] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 595.337698][T21110] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 595.357411][T21111] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 595.438584][T21131] EXT4-fs (loop1): bad geometry: block count 385876067 exceeds size of device (132096 blocks) 22:23:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:46 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000002040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:46 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040f00d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:46 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006309000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:46 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000004000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:46 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000003040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:46 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000041800d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:46 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000042600d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:46 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000004040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001905000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 596.186446][T21144] EXT4-fs (loop1): bad geometry: block count 402653283 exceeds size of device (132096 blocks) [ 596.196875][T21139] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 596.223154][T21139] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:46 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000044100d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 596.230942][T21141] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 596.252601][T21141] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 596.329522][T21160] EXT4-fs (loop1): bad geometry: block count 419430499 exceeds size of device (132096 blocks) 22:23:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000005040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001f05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000046900d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:47 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:47 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006302000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000006040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040402d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 597.042361][T21169] EXT4-fs (loop1): bad geometry: block count 520093795 exceeds size of device (132096 blocks) [ 597.061381][T21176] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 597.081874][T21175] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040003d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000008040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000f040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040204d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 597.090602][T21176] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 597.102550][T21175] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:48 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000018040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:48 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040604d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:48 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006303000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300002005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:48 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630b000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:48 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000026040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:48 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040005d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:48 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000041040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 597.900757][T21201] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 597.913457][T21205] EXT4-fs (loop1): bad geometry: block count 536871011 exceeds size of device (132096 blocks) [ 597.931542][T21207] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 597.936511][T21201] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:48 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040006d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300102005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:48 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040406d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 597.940945][T21207] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 598.101933][T21223] EXT4-fs (loop1): bad geometry: block count 537919587 exceeds size of device (132096 blocks) 22:23:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:49 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000004000fd7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:49 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000069040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:49 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:49 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300002205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:49 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000050000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:49 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040018d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:49 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000004001fd7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:49 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000090000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:49 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040020d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 598.816744][T21234] EXT4-fs (loop1): bad geometry: block count 570425443 exceeds size of device (132096 blocks) [ 598.853377][T21238] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300002505000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 598.879057][T21238] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 598.883991][T21240] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 598.913134][T21240] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 598.929370][T21258] EXT4-fs (loop1): bad geometry: block count 620757091 exceeds size of device (132096 blocks) 22:23:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040026d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000c0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630d000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300012805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:50 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006305000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000004003fd7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040040d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040041d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040069d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000170000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040002d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:50 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630e000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 599.742629][T21266] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 599.751026][T21266] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 599.767193][T21268] EXT4-fs (loop1): bad geometry: block count 671154275 exceeds size of device (132096 blocks) 22:23:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040003d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 599.818601][T21273] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 599.826978][T21273] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300002e05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 599.964808][T21302] EXT4-fs (loop1): bad geometry: block count 771752035 exceeds size of device (132096 blocks) [ 599.981768][T21298] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 600.005337][T21298] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000180000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040004d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006306000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300003605000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630f000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000200000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040005d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000003f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300013905000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 600.621428][T21311] EXT4-fs (loop1): bad geometry: block count 905969763 exceeds size of device (132096 blocks) [ 600.652935][T21316] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000400000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040006d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 600.682277][T21314] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 600.692680][T21316] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 600.706038][T21314] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 600.735688][T21330] EXT4-fs (loop1): bad geometry: block count 956366947 exceeds size of device (132096 blocks) 22:23:51 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040008d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000008008d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006310000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300003f05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:51 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006307000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000020000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000004000fd7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 601.526393][T21344] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 601.536910][T21344] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 601.545856][T21346] EXT4-fs (loop1): bad geometry: block count 1056964707 exceeds size of device (132096 blocks) [ 601.546679][T21343] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040018d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000030000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300004005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000050000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040026d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000090000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 601.569063][T21343] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:52 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006311000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040041d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 601.748107][T21372] EXT4-fs (loop1): bad geometry: block count 1073741923 exceeds size of device (132096 blocks) [ 601.769605][T21375] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 601.779914][T21375] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000c0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006308000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040069d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300004105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:52 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006312000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4795fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed410000000f0000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300034505000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 602.488925][T21384] EXT4-fs (loop1): bad geometry: block count 1090519139 exceeds size of device (132096 blocks) [ 602.521037][T21390] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 602.531252][T21392] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:53 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f46507d7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000100000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000170000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4795fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 602.535509][T21390] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 602.552555][T21392] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:53 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006309000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000180000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f46507d7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 602.667067][T21408] EXT4-fs (loop1): bad geometry: block count 1157824611 exceeds size of device (132096 blocks) [ 602.685208][T21420] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 602.693614][T21420] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:53 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4795f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040200d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006313000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300004805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040300d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f46507000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040400d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 603.435772][T21429] EXT4-fs (loop1): bad geometry: block count 1207959651 exceeds size of device (132096 blocks) [ 603.458304][T21430] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 603.468247][T21434] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 603.468995][T21430] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:53 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000880000002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040500d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f020000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 603.476582][T21434] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:54 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040600d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f030000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006314000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630b000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300004c05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040800d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f040000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040f00d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f050000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 604.381555][T21468] EXT4-fs (loop1): bad geometry: block count 1275068515 exceeds size of device (132096 blocks) 22:23:54 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000041800d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:54 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000042600d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 604.437363][T21466] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 604.448754][T21460] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 604.457133][T21460] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 604.468943][T21466] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f060000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:55 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000044100d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:55 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:55 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006315000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300006005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f080000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:55 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000046900d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0f0000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f180000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 605.266807][T21500] EXT4-fs (loop1): bad geometry: block count 1610612835 exceeds size of device (132096 blocks) [ 605.293150][T21492] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 605.301180][T21495] EXT4-fs (loop2): revision level too high, forcing read-only mode 22:23:55 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040402d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f260000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 605.314139][T21492] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 605.322777][T21495] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040003d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f410000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006316000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630d000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300006305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040204d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f690000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040604d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f040200000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 606.166455][T21531] EXT4-fs (loop1): bad geometry: block count 1660944483 exceeds size of device (132096 blocks) [ 606.203487][T21527] EXT4-fs (loop2): revision level too high, forcing read-only mode 22:23:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040005d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300006805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000300000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040006d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 606.215522][T21527] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 606.224512][T21529] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 606.240403][T21529] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:56 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006317000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f020400000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040406d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 606.352510][T21555] EXT4-fs (loop1): bad geometry: block count 1744830563 exceeds size of device (132096 blocks) [ 606.382260][T21563] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 606.398978][T21563] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:57 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630e000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f060400000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000004000fd7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300006c05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:57 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006318000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000500000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040018d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000004001fd7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:57 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006319000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 607.046920][T21575] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 607.058139][T21575] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 607.069487][T21573] EXT4-fs (loop1): bad geometry: block count 1811939427 exceeds size of device (132096 blocks) 22:23:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040020d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 607.113429][T21576] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 607.130432][T21576] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 607.132263][T21589] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 607.154513][T21589] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040026d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f040600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300007405000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630f000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:58 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000004003fd7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000f00000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300017905000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006310000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 607.918044][T21604] EXT4-fs (loop1): bad geometry: block count 1946157155 exceeds size of device (132096 blocks) [ 607.929395][T21607] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 607.939524][T21607] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 607.955780][T21611] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300007a05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f081000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040040d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040041d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f001800000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 607.965274][T21611] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:23:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040069d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 608.107176][T21639] EXT4-fs (loop1): bad geometry: block count 2046820451 exceeds size of device (132096 blocks) [ 608.116076][T21621] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 608.139917][T21621] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:23:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, 0x0, 0x0, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:23:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f001f00000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040002d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:59 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631b000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006311000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300f18005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040003d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f002000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300038105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 608.845221][T21648] EXT4-fs (loop1): bad geometry: block count 2163277923 exceeds size of device (132096 blocks) [ 608.871167][T21650] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:23:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f002600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040004d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:23:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040005d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 608.899475][T21650] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 608.913835][T21652] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 608.924502][T21652] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 609.028586][T21663] EXT4-fs (loop1): bad geometry: block count 2164457571 exceeds size of device (132096 blocks) 22:24:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, 0x0, 0x0, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f003f00000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040006d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006312000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300008205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f004000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040008d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300018805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f004100000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed4100000004000fd7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:00 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631d000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 609.784439][T21683] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 609.792724][T21685] EXT4-fs (loop1): bad geometry: block count 2181038179 exceeds size of device (132096 blocks) [ 609.803171][T21687] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 609.804847][T21683] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 609.813604][T21687] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 609.964672][T21708] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 609.973143][T21708] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 609.982522][T21700] EXT4-fs (loop1): bad geometry: block count 2281767011 exceeds size of device (132096 blocks) 22:24:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, 0x0, 0x0, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f006900000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040018d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006313000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300038b05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631e000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040026d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000008000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 610.663091][T21718] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 610.672606][T21721] EXT4-fs (loop1): bad geometry: block count 2332229731 exceeds size of device (132096 blocks) [ 610.685057][T21718] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 610.687430][T21717] EXT4-fs (loop4): revision level too high, forcing read-only mode 22:24:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040041d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f400008000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040069d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 610.710759][T21717] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:24:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}], 0x2, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000020000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006314000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4795fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006320000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630001b805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f46507d7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000010000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006321000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000020000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 611.502243][T21749] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 611.536801][T21751] EXT4-fs (loop1): bad geometry: block count 3087073379 exceeds size of device (132096 blocks) 22:24:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004020000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4795fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 611.547751][T21752] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 611.563481][T21752] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 611.678565][T21766] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}], 0x2, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000030000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630003c005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f46507d7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006315000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006322000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4795f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006323000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000c905000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 612.420669][T21782] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 612.436501][T21783] EXT4-fs (loop1): bad geometry: block count 3221422179 exceeds size of device (132096 blocks) 22:24:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f46507000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000050000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 612.469506][T21784] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 612.637298][T21798] EXT4-fs (loop1): bad geometry: block count 3372220515 exceeds size of device (132096 blocks) [ 612.668673][T21794] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000880000002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006316000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006324000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}], 0x2, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000bce05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f020000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 613.428821][T21813] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:03 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000010080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006325000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f030000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:03 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006317000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f040000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 613.470889][T21818] EXT4-fs (loop1): bad geometry: block count 3456827491 exceeds size of device (132096 blocks) [ 613.482149][T21817] EXT4-fs (loop2): revision level too high, forcing read-only mode 22:24:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000180000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 613.617943][T21833] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 613.634437][T21845] EXT4-fs (loop2): revision level too high, forcing read-only mode 22:24:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f050000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000001f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000bcf05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006318000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {0x0}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:04 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006326000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000260000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f060000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000003f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 614.361708][T21855] EXT4-fs (loop1): bad geometry: block count 3473604707 exceeds size of device (132096 blocks) [ 614.383542][T21859] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000400000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f080000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000800400000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0f0000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006327000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630003e605000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 614.427657][T21860] EXT4-fs (loop2): revision level too high, forcing read-only mode 22:24:05 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006319000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 614.524766][T21882] EXT4-fs (loop1): bad geometry: block count 3858956387 exceeds size of device (132096 blocks) [ 614.525736][T21884] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 614.568729][T21888] EXT4-fs (loop2): revision level too high, forcing read-only mode 22:24:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {0x0}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:05 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000410000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f180000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630080f105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:05 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006328000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:05 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:05 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000690000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f260000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 615.275462][T21898] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 615.284075][T21902] EXT4-fs (loop1): bad geometry: block count 4051697763 exceeds size of device (132096 blocks) 22:24:05 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655ffffffff60000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f410000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:05 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006329000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f690000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 615.324222][T21903] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 615.478860][T21921] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {0x0}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:06 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655ffffffffe0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f040200000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:06 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631b000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000fff05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:06 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000300000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:06 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655ff6ffffff0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f020400000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f060400000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 616.157035][T21930] EXT4-fs (loop1): bad geometry: block count 4279173219 exceeds size of device (132096 blocks) [ 616.171336][T21934] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:06 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655ffeffffff0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001000000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 616.214425][T21927] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 616.354555][T21952] EXT4-fs (loop1): bad geometry: block count 268435555 exceeds size of device (132096 blocks) 22:24:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {&(0x7f0000000280)=""/217, 0xd9}], 0x2, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000500000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:07 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f7fffffffffffffff02", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:07 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:07 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632b000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000003000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:07 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000200000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:07 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000300000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f040600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:07 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 617.065187][T21959] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 617.078181][T21967] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 617.088399][T21959] EXT4-fs mount: 7 callbacks suppressed [ 617.088412][T21959] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 617.105204][T21962] EXT4-fs (loop2): revision level too high, forcing read-only mode 22:24:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 617.131917][T21962] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 617.238761][T21983] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 617.328046][T21987] EXT4-fs (loop1): bad geometry: block count 33554531 exceeds size of device (132096 blocks) 22:24:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {&(0x7f0000000280)=""/217, 0xd9}], 0x2, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:08 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000f00000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000400000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631d000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632d000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f081000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000500000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000405000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f001800000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:08 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632e000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 617.971923][T22003] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 617.978772][T21994] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 617.978783][T22000] EXT4-fs (loop1): bad geometry: block count 50331747 exceeds size of device (132096 blocks) [ 618.006642][T21994] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 618.122797][T22016] EXT4-fs (loop1): bad geometry: block count 67108963 exceeds size of device (132096 blocks) [ 618.149131][T22019] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {&(0x7f0000000280)=""/217, 0xd9}], 0x2, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f001f00000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000800000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000631e000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000505000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632f000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f002000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000f00000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f001800000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f002600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000605000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:09 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f003f00000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 618.899776][T22032] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 618.909505][T22034] EXT4-fs (loop1): bad geometry: block count 83886179 exceeds size of device (132096 blocks) [ 618.910094][T22030] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 618.920305][T22032] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 22:24:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f004000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f002600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006320000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006330000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x2, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000705000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f004100000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f004100000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006331000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006321000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f006900000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f006900000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 619.838163][T22058] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 619.844174][T22060] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 619.873517][T22065] EXT4-fs (loop1): bad geometry: block count 117440611 exceeds size of device (132096 blocks) 22:24:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000402000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000008000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:10 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000003000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 619.984883][T22078] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 620.010626][T22073] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:11 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000204000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f400008000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006322000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x2, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:11 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006332000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000604000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000020000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000010000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000005000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000020000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 620.734323][T22105] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 620.745192][T22103] EXT4-fs (loop1): bad geometry: block count 134217827 exceeds size of device (132096 blocks) [ 620.756688][T22100] EXT4-fs (loop2): inodes count not valid: 32 vs 64 22:24:11 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000006000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004020000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000406000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000905000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:11 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006323000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 620.939460][T22130] EXT4-fs (loop1): bad geometry: block count 150995043 exceeds size of device (132096 blocks) [ 620.960831][T22132] EXT4-fs (loop2): inodes count not valid: 32 vs 64 22:24:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x2, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000030000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006333000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000f000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006324000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000a05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000810000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000050000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006334000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 621.596254][T22138] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 621.608869][T22146] EXT4-fs (loop1): bad geometry: block count 167772259 exceeds size of device (132096 blocks) 22:24:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000b05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 621.638341][T22143] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 621.694635][T22162] EXT4-fs (loop1): bad geometry: block count 184549475 exceeds size of device (132096 blocks) 22:24:12 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006325000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000018000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006335000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000c05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00001f000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006326000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006336000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000010080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 622.525144][T22173] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 622.540686][T22177] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 622.543883][T22175] EXT4-fs (loop1): bad geometry: block count 201326691 exceeds size of device (132096 blocks) 22:24:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000020000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006327000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000026000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00003f000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000d05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 622.709718][T22191] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 622.709847][T22202] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 622.754550][T22206] EXT4-fs (loop1): bad geometry: block count 218103907 exceeds size of device (132096 blocks) 22:24:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000040000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000180000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006337000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006328000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000e05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000001f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000041000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000260000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000069000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006329000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 623.418617][T22217] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 623.436496][T22212] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:13 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006338000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000003f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 623.462251][T22218] EXT4-fs (loop1): bad geometry: block count 234881123 exceeds size of device (132096 blocks) 22:24:14 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000400000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 623.508907][T22235] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 623.725499][T22237] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:14 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000800400000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f004000080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000f05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006339000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000410000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000200000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000100040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000200040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000690000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040200040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 624.307157][T22255] EXT4-fs (loop1): bad geometry: block count 251658339 exceeds size of device (132096 blocks) [ 624.326875][T22260] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 624.339068][T22259] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632b000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655ffffffff60000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000300040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655ffffffffe0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000500040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655ff6ffffff0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 625.205033][T22288] EXT4-fs (loop1): bad geometry: block count 268435555 exceeds size of device (132096 blocks) [ 625.227056][T22286] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 625.235311][T22289] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 625.411064][T22307] EXT4-fs (loop1): bad geometry: block count 285212771 exceeds size of device (132096 blocks) 22:24:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655ffeffffff0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:16 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633b000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f7fffffffffffffff02", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001405000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000100800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000200000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000300000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 626.080730][T22317] EXT4-fs (loop1): bad geometry: block count 301989987 exceeds size of device (132096 blocks) [ 626.103172][T22319] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 626.113443][T22321] EXT4-fs (loop2): inodes count not valid: 32 vs 64 22:24:16 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632d000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:16 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000400000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 626.224757][T22329] EXT4-fs (loop1): bad geometry: block count 335544419 exceeds size of device (132096 blocks) [ 626.235325][T22344] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 626.242271][T22345] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000500000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632e000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633d000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001605000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000632f000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000800000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000f00000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000003f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f001800000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 626.990487][T22359] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 627.003566][T22358] EXT4-fs (loop4): inodes count not valid: 32 vs 64 [ 627.011854][T22362] EXT4-fs (loop1): bad geometry: block count 369098851 exceeds size of device (132096 blocks) 22:24:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001705000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:17 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633e000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 627.112350][T22385] EXT4-fs (loop1): bad geometry: block count 385876067 exceeds size of device (132096 blocks) [ 627.168785][T22378] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 627.206124][T22389] EXT4-fs (loop4): inodes count not valid: 32 vs 64 22:24:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}], 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:18 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f002600000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006330000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006341000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000008004000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f004100000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f006900000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000402000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300001905000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:18 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000003000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 627.878275][T22397] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 627.887176][T22403] EXT4-fs (loop1): bad geometry: block count 402653283 exceeds size of device (132096 blocks) [ 627.910891][T22401] EXT4-fs (loop4): inodes count not valid: 32 vs 96 [ 628.024916][T22417] EXT4-fs (loop1): bad geometry: block count 419430499 exceeds size of device (132096 blocks) 22:24:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}], 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000204000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004100040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:19 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006348000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:19 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006331000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300002205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000006900040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000604000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00fffffff600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000005000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 628.869682][T22430] EXT4-fs (loop1): bad geometry: block count 570425443 exceeds size of device (132096 blocks) [ 628.890367][T22431] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 628.897027][T22432] EXT4-fs (loop4): inodes count not valid: 32 vs 96 22:24:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300002505000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00fffffffe00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 629.098181][T22453] EXT4-fs (loop1): bad geometry: block count 620757091 exceeds size of device (132096 blocks) 22:24:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0xe3}], 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:20 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000006000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00f6ffffff00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006332000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000634c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300002e05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000406000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00feffffff00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006333000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300003605000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000002000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:20 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000f000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 629.743954][T22457] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 629.759780][T22465] EXT4-fs (loop1): bad geometry: block count 771752035 exceeds size of device (132096 blocks) [ 629.772680][T22464] EXT4-fs (loop4): inodes count not valid: 32 vs 96 [ 629.940114][T22477] EXT4-fs (loop1): bad geometry: block count 905969763 exceeds size of device (132096 blocks) [ 629.954282][T22483] EXT4-fs (loop2): inodes count not valid: 32 vs 64 22:24:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000003000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000810000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006360000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300004105000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006334000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000018000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006363000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300004805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006335000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000005000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 630.661425][T22492] EXT4-fs (loop4): inodes count not valid: 32 vs 128 [ 630.670264][T22497] EXT4-fs (loop1): bad geometry: block count 1090519139 exceeds size of device (132096 blocks) [ 630.680832][T22489] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 630.816089][T22507] EXT4-fs (loop4): inodes count not valid: 32 vs 128 [ 630.822320][T22514] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 630.832863][T22511] EXT4-fs (loop1): bad geometry: block count 1207959651 exceeds size of device (132096 blocks) 22:24:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:22 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00001f000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000006000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300004c05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006336000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006368000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000008000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000020000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006337000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000026000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000636c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000f000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 631.659944][T22524] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 631.677107][T22528] EXT4-fs (loop1): bad geometry: block count 1275068515 exceeds size of device (132096 blocks) [ 631.698603][T22526] EXT4-fs (loop4): inodes count not valid: 32 vs 128 [ 631.824408][T22539] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 631.824853][T22547] EXT4-fs (loop4): inodes count not valid: 32 vs 128 22:24:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00003f000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000018000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300006005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006374000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:23 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006338000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000026000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000040000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000041000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000637a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000041000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000069000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000069000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004020000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 632.586400][T22557] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 632.587577][T22562] EXT4-fs (loop1): bad geometry: block count 1610612835 exceeds size of device (132096 blocks) [ 632.616181][T22559] EXT4-fs (loop4): inodes count not valid: 32 vs 128 22:24:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300006305000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:23 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 632.760946][T22582] EXT4-fs (loop4): inodes count not valid: 32 vs 128 [ 632.783832][T22588] EXT4-fs (loop1): bad geometry: block count 1660944483 exceeds size of device (132096 blocks) 22:24:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{0x0}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:24 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000030000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:24 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006339000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:24 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300006805000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:24 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006382000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:24 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000002040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:24 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f004000080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:24 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000006040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:24 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063c9000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:24 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000200000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 633.567848][T22602] EXT4-fs (loop4): inodes count not valid: 32 vs 160 [ 633.572336][T22597] EXT4-fs (loop1): bad geometry: block count 1744830563 exceeds size of device (132096 blocks) [ 633.574728][T22600] EXT4-fs (loop2): inodes count not valid: 32 vs 64 22:24:24 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000100040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 633.689969][T22614] EXT4-fs (loop4): inodes count not valid: 32 vs 224 22:24:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{0x0}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:25 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000050000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:25 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006388010005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000200040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300006c05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040200040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:25 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000300040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300007405000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 634.533120][T22625] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 634.553698][T22630] EXT4-fs (loop1): bad geometry: block count 1811939427 exceeds size of device (132096 blocks) [ 634.560832][T22633] EXT4-fs (loop4): inodes count not valid: 32 vs 416 22:24:25 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633b000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 634.707604][T22647] EXT4-fs (loop1): bad geometry: block count 1946157155 exceeds size of device (132096 blocks) [ 634.709715][T22645] EXT4-fs (loop2): inodes count not valid: 32 vs 64 22:24:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063b8010005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300007a05000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{0x0}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:26 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000008100000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000500040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000180000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000001f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000200000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 635.550862][T22660] EXT4-fs (loop1): bad geometry: block count 2046820451 exceeds size of device (132096 blocks) [ 635.561471][T22659] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 635.585149][T22664] EXT4-fs (loop4): inodes count not valid: 32 vs 448 22:24:26 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300008205000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 635.698035][T22690] EXT4-fs (loop1): bad geometry: block count 2181038179 exceeds size of device (132096 blocks) [ 635.709027][T22687] EXT4-fs (loop4): bad geometry: block count 132195 exceeds size of device (132096 blocks) 22:24:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000100800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000260000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633d000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006311020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000c905000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000003f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:26 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000400000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000410000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000006000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 636.489195][T22702] EXT4-fs (loop4): bad geometry: block count 135523 exceeds size of device (132096 blocks) [ 636.505556][T22704] EXT4-fs (loop1): bad geometry: block count 3372220515 exceeds size of device (132096 blocks) [ 636.521374][T22697] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 636.702461][T22722] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 636.710825][T22722] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:27 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000633e000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000690000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006316020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000007000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000009000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000003f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 637.419378][T22733] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 637.420083][T22730] EXT4-fs (loop2): inodes count not valid: 32 vs 64 [ 637.429230][T22733] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 637.445309][T22737] EXT4-fs (loop4): bad geometry: block count 136803 exceeds size of device (132096 blocks) 22:24:28 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006341000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000040000800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000a000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 637.535274][T22755] EXT4-fs (loop4): bad geometry: block count 196707 exceeds size of device (132096 blocks) [ 637.597177][T22766] EXT4-fs (loop2): inodes count not valid: 32 vs 96 [ 637.598030][T22763] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 637.611953][T22763] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000008004000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006348000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000b000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000001040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004100040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000006900040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000002040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00fffffff600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000402040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 638.378030][T22776] EXT4-fs (loop4): bad geometry: block count 197731 exceeds size of device (132096 blocks) [ 638.382503][T22780] EXT4-fs (loop2): inodes count not valid: 32 vs 96 [ 638.405530][T22775] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 638.417465][T22775] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000003040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00fffffffe00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000c000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006381030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:29 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000634c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000004040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00f6ffffff00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000005040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00feffffff00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 639.294676][T22812] EXT4-fs (loop4): bad geometry: block count 229731 exceeds size of device (132096 blocks) [ 639.319446][T22808] EXT4-fs (loop2): inodes count not valid: 32 vs 96 22:24:29 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000002000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000638b030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000006040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000003000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 639.360952][T22810] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 639.373825][T22810] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000d000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:29 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006360000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 639.417747][T22831] EXT4-fs (loop4): bad geometry: block count 232291 exceeds size of device (132096 blocks) [ 639.455567][T22838] EXT4-fs (loop2): inodes count not valid: 32 vs 128 [ 639.565673][T22841] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 639.576169][T22841] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:30 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000406040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:30 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:30 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063c0030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:30 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006363000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000e000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:30 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000005000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:30 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000008040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:30 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000006000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:30 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001008040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:30 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006368000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 640.201351][T22851] EXT4-fs (loop4): bad geometry: block count 245859 exceeds size of device (132096 blocks) [ 640.201371][T22852] EXT4-fs (loop2): inodes count not valid: 32 vs 128 22:24:30 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000008000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 640.255419][T22857] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 640.281058][T22857] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 640.324289][T22873] EXT4-fs (loop2): inodes count not valid: 32 vs 128 22:24:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:31 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006302040005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:31 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000f000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000f000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:31 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000636c000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000018040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:31 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000018000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:31 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000026000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000001f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:31 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006303040005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 641.111152][T22881] EXT4-fs (loop4): bad geometry: block count 262755 exceeds size of device (132096 blocks) [ 641.130288][T22886] EXT4-fs (loop2): inodes count not valid: 32 vs 128 22:24:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000026040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 641.176297][T22889] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 641.199532][T22889] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 641.243411][T22904] EXT4-fs (loop4): bad geometry: block count 263011 exceeds size of device (132096 blocks) 22:24:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:32 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000041000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:32 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000003f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:32 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006374000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000011000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:32 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006306040005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:32 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000069000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:32 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000040040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:32 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004020000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:32 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000030000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:32 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000080040040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 642.006360][T22914] EXT4-fs (loop2): inodes count not valid: 32 vs 128 [ 642.016843][T22921] EXT4-fs (loop4): bad geometry: block count 263779 exceeds size of device (132096 blocks) 22:24:32 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000002040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 642.068601][T22917] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 642.077506][T22917] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000041040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:33 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000637a000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:33 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000006040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000012000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:33 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006310040005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000069040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:33 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000050000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000fffffff6040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 642.903211][T22945] EXT4-fs (loop4): bad geometry: block count 266339 exceeds size of device (132096 blocks) [ 642.906952][T22948] EXT4-fs (loop2): inodes count not valid: 32 vs 128 [ 642.937521][T22953] EXT4-fs (loop1): revision level too high, forcing read-only mode 22:24:33 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000fffffffe040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:33 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000004060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 642.948925][T22953] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000f6ffffff040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000014000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300050005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:34 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063c9000005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000008100000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000feffffff040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000180000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000020002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006388010005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300060005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 643.830595][T22980] EXT4-fs (loop4): bad geometry: block count 327779 exceeds size of device (132096 blocks) [ 643.846797][T22984] EXT4-fs (loop2): inodes count not valid: 32 vs 224 22:24:34 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000001f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000030002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000018000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000020000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 643.891677][T22982] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 643.900034][T22982] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 643.972657][T22998] EXT4-fs (loop4): bad geometry: block count 393315 exceeds size of device (132096 blocks) [ 644.029024][T23004] EXT4-fs (loop2): inodes count not valid: 32 vs 416 [ 644.136089][T23013] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 644.168303][T23013] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:35 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000200000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000030000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:35 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304060005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:35 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063b8010005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000020000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:35 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000260000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:35 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063ca010005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 644.800777][T23024] EXT4-fs (loop2): inodes count not valid: 32 vs 448 [ 644.808786][T23022] EXT4-fs (loop4): bad geometry: block count 394339 exceeds size of device (132096 blocks) [ 644.837506][T23028] EXT4-fs (loop1): revision level too high, forcing read-only mode 22:24:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000050000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:35 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000003f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 644.846474][T23028] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 644.934263][T23042] EXT4-fs (loop2): inodes count not valid: 32 vs 480 22:24:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:36 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000400000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000040000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300070005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000410000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000690000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000041000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000180000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:36 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300090005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 645.741268][T23053] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 645.750240][T23053] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 645.760232][T23058] EXT4-fs (loop4): bad geometry: block count 458851 exceeds size of device (132096 blocks) [ 645.775429][T23056] EXT4-fs (loop2): bad geometry: block count 132195 exceeds size of device (132096 blocks) [ 645.921481][T23078] EXT4-fs (loop4): bad geometry: block count 589923 exceeds size of device (132096 blocks) 22:24:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:37 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:37 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000260000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:37 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630f020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000002000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:37 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:37 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:37 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000410000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:37 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000690000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:37 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040200040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 646.623623][T23088] EXT4-fs (loop2): bad geometry: block count 135011 exceeds size of device (132096 blocks) [ 646.657128][T23092] EXT4-fs (loop4): bad geometry: block count 655459 exceeds size of device (132096 blocks) 22:24:37 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000040000800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:37 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006314020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 646.671533][T23093] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 646.683687][T23093] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 646.845072][T23110] EXT4-fs (loop2): bad geometry: block count 136291 exceeds size of device (132096 blocks) 22:24:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) 22:24:38 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000300040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:38 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:38 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000638e0a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000003000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:38 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006316020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:38 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000020400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:38 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000001040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:38 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006335020005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:38 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000002040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 647.567997][T23119] EXT4-fs (loop2): bad geometry: block count 136803 exceeds size of device (132096 blocks) [ 647.596603][T23125] EXT4-fs (loop4): bad geometry: block count 691811 exceeds size of device (132096 blocks) 22:24:38 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000060400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:38 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000500040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 647.616077][T23120] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 647.631155][T23120] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 647.699570][T23140] EXT4-fs (loop2): bad geometry: block count 144739 exceeds size of device (132096 blocks) 22:24:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) 22:24:39 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000402040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063910a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000004000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000003040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 648.559284][T23154] EXT4-fs (loop4): bad geometry: block count 692579 exceeds size of device (132096 blocks) [ 648.559892][T23150] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 648.578133][T23158] EXT4-fs (loop2): bad geometry: block count 196707 exceeds size of device (132096 blocks) 22:24:39 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000b0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000004040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000006000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 648.608358][T23150] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 648.790852][T23176] EXT4-fs (loop4): bad geometry: block count 720995 exceeds size of device (132096 blocks) [ 648.829960][T23179] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 648.842606][T23179] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) 22:24:39 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000005040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000c0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000007000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000006040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:39 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000638b030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000406040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000008000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 649.450712][T23186] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 649.456177][T23191] EXT4-fs (loop4): bad geometry: block count 786531 exceeds size of device (132096 blocks) [ 649.463403][T23186] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 649.478818][T23189] EXT4-fs (loop2): bad geometry: block count 197731 exceeds size of device (132096 blocks) 22:24:40 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 649.675072][T23204] EXT4-fs (loop2): bad geometry: block count 232291 exceeds size of device (132096 blocks) [ 649.711467][T23214] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 649.723995][T23214] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:40 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000008040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000d0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006302040005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000009000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001008040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304030005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000003f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006303040005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000e0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 650.328396][T23222] EXT4-fs (loop2): bad geometry: block count 262755 exceeds size of device (132096 blocks) [ 650.343102][T23225] EXT4-fs (loop4): bad geometry: block count 852067 exceeds size of device (132096 blocks) 22:24:40 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000f0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000018040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000001f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004100040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000a000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:40 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000026040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 650.405365][T23227] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 650.422905][T23227] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 650.483412][T23242] EXT4-fs (loop3): bad geometry: block count 197731 exceeds size of device (132096 blocks) 22:24:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000018000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000006900040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006306040005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000003f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000050002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 650.529522][T23239] EXT4-fs (loop2): bad geometry: block count 263011 exceeds size of device (132096 blocks) [ 650.540744][T23253] EXT4-fs (loop4): bad geometry: block count 983139 exceeds size of device (132096 blocks) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000040040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 650.580309][T23259] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 650.592881][T23259] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 650.620463][T23266] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 650.628764][T23266] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 22:24:41 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304100005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000080040040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000b000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000090002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000c0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000041040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 650.721155][T23274] EXT4-fs (loop2): bad geometry: block count 263779 exceeds size of device (132096 blocks) 22:24:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000a000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000069040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000f0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006310040005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000fffffff6040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000100002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 650.786231][T23286] EXT4-fs (loop4): bad geometry: block count 1049699 exceeds size of device (132096 blocks) [ 650.791370][T23289] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 650.828084][T23298] EXT4-fs (loop2): bad geometry: block count 266339 exceeds size of device (132096 blocks) [ 650.841273][T23289] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:41 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006320100005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000fffffffe040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000200002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300050005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000c000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000003f0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 650.957763][T23304] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 650.967298][T23304] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 22:24:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000f6ffffff040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000400002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000feffffff040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 651.016487][T23311] EXT4-fs (loop2): bad geometry: block count 327779 exceeds size of device (132096 blocks) [ 651.049910][T23319] EXT4-fs (loop4): bad geometry: block count 1056867 exceeds size of device (132096 blocks) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000880000002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000020002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000200040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300110005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300060005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 651.061867][T23318] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 651.073616][T23318] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000d000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000030002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:41 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000300040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 651.126984][T23337] EXT4-fs (loop2): bad geometry: block count 393315 exceeds size of device (132096 blocks) [ 651.236488][T23344] EXT4-fs (loop4): bad geometry: block count 1114211 exceeds size of device (132096 blocks) [ 651.263237][T23349] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 651.277627][T23349] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:42 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000020000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304060005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:42 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006302110005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000e000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000030000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000500040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300070005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 651.905962][T23357] EXT4-fs (loop2): bad geometry: block count 394339 exceeds size of device (132096 blocks) [ 651.920489][T23359] EXT4-fs (loop4): bad geometry: block count 1114723 exceeds size of device (132096 blocks) 22:24:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000050000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000060000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:42 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 651.958330][T23364] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 651.968910][T23364] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 652.047990][T23380] EXT4-fs (loop2): bad geometry: block count 458851 exceeds size of device (132096 blocks) 22:24:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:43 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300120005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000080000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:43 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000f000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:43 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300090005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:43 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000f0000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:43 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300130005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 652.889932][T23396] EXT4-fs (loop2): bad geometry: block count 589923 exceeds size of device (132096 blocks) [ 652.900985][T23400] EXT4-fs (loop4): bad geometry: block count 1179747 exceeds size of device (132096 blocks) 22:24:43 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:43 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000180000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:43 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 652.964100][T23401] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 652.997547][T23401] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 653.037078][T23412] EXT4-fs (loop4): bad geometry: block count 1245283 exceeds size of device (132096 blocks) [ 653.047511][T23420] EXT4-fs (loop2): bad geometry: block count 655459 exceeds size of device (132096 blocks) 22:24:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:44 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000260000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:44 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004100040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:44 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063930a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000010000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:44 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300140005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:44 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000410000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:44 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000006900040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:44 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000402040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:44 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000690000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:44 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000003040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 653.833600][T23432] EXT4-fs (loop2): bad geometry: block count 693091 exceeds size of device (132096 blocks) [ 653.851039][T23431] EXT4-fs (loop1): revision level too high, forcing read-only mode 22:24:44 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000204040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 653.878147][T23435] EXT4-fs (loop4): bad geometry: block count 1310819 exceeds size of device (132096 blocks) [ 653.890255][T23431] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 22:24:45 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040200040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:45 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000b0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:45 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300150005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:45 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000604040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000011000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:45 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000300040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:45 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000005040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:45 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300160005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:45 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000c0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 654.742902][T23461] EXT4-fs (loop4): bad geometry: block count 1376355 exceeds size of device (132096 blocks) [ 654.746266][T23458] EXT4-fs (loop2): bad geometry: block count 720995 exceeds size of device (132096 blocks) 22:24:45 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000020400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:45 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000006040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 654.791686][T23466] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 654.803947][T23466] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 654.835861][T23475] EXT4-fs (loop2): bad geometry: block count 786531 exceeds size of device (132096 blocks) [ 654.969683][T23484] EXT4-fs (loop4): bad geometry: block count 1441891 exceeds size of device (132096 blocks) 22:24:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 22:24:46 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000060400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000012000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:46 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000406040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:46 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000d0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:46 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006302160005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:46 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000500040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:46 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:46 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300170005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:46 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000018040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:46 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300180005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 655.646154][T23491] EXT4-fs (loop4): bad geometry: block count 1442403 exceeds size of device (132096 blocks) [ 655.666267][T23497] EXT4-fs (loop2): bad geometry: block count 852067 exceeds size of device (132096 blocks) 22:24:46 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000001f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 655.722158][T23498] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 655.733577][T23498] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 22:24:47 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000e0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300190005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000020040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000014000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000026040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000040600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000003f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000040040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 656.596762][T23528] EXT4-fs (loop4): bad geometry: block count 1638499 exceeds size of device (132096 blocks) [ 656.624105][T23523] EXT4-fs (loop2): bad geometry: block count 917603 exceeds size of device (132096 blocks) [ 656.634270][T23526] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 656.656380][T23526] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 656.725261][T23547] EXT4-fs (loop4): bad geometry: block count 1704035 exceeds size of device (132096 blocks) 22:24:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:47 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000f0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000041040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000018000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001b0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000069040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:47 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000030002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 657.488883][T23563] EXT4-fs (loop2): bad geometry: block count 983139 exceeds size of device (132096 blocks) [ 657.492543][T23558] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 657.528196][T23561] EXT4-fs (loop4): bad geometry: block count 1769571 exceeds size of device (132096 blocks) 22:24:48 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063020f0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 657.542259][T23558] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 657.684785][T23581] EXT4-fs (loop2): bad geometry: block count 983651 exceeds size of device (132096 blocks) 22:24:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000041000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000003f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000002040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001c0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006304100005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000003040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000004040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004100040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 658.415423][T23590] EXT4-fs (loop2): bad geometry: block count 1049699 exceeds size of device (132096 blocks) [ 658.429286][T23595] EXT4-fs (loop4): bad geometry: block count 1835107 exceeds size of device (132096 blocks) 22:24:48 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000006900040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:48 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000005040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 658.469837][T23591] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 658.478187][T23591] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:49 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006320100005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:49 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001d0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:49 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000050002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:49 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000006040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005020025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:49 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000008040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:49 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000090002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:49 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300110005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 659.319085][T23625] EXT4-fs (loop2): bad geometry: block count 1056867 exceeds size of device (132096 blocks) [ 659.336842][T23623] EXT4-fs (loop4): bad geometry: block count 1900643 exceeds size of device (132096 blocks) 22:24:49 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:49 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000c0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:49 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000f0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 659.381775][T23626] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 659.392229][T23626] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 659.432815][T23640] EXT4-fs (loop2): bad geometry: block count 1114211 exceeds size of device (132096 blocks) 22:24:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:50 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001e0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:50 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000100002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000018040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005030025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:50 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300120005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000026040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:50 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000170002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000041040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:50 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000180002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 660.220707][T23653] EXT4-fs (loop4): bad geometry: block count 1966179 exceeds size of device (132096 blocks) [ 660.239667][T23660] EXT4-fs (loop2): bad geometry: block count 1179747 exceeds size of device (132096 blocks) 22:24:50 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300130005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:50 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001f0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 660.271816][T23658] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 660.280738][T23658] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 660.396476][T23676] EXT4-fs (loop4): bad geometry: block count 2031715 exceeds size of device (132096 blocks) [ 660.421820][T23679] EXT4-fs (loop2): bad geometry: block count 1245283 exceeds size of device (132096 blocks) 22:24:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000200002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000069040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005040025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300200005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:51 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300140005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000050002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000003f0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000090002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000400002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 661.101340][T23684] EXT4-fs (loop2): bad geometry: block count 1310819 exceeds size of device (132096 blocks) [ 661.121594][T23689] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 661.136274][T23691] EXT4-fs (loop4): bad geometry: block count 2097251 exceeds size of device (132096 blocks) 22:24:51 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000c0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000880000002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006302140005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000f0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005050025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:51 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006310200005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 661.169909][T23689] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 661.229090][T23714] EXT4-fs (loop2): bad geometry: block count 1311331 exceeds size of device (132096 blocks) [ 661.249641][T23718] EXT4-fs (loop4): bad geometry: block count 2101347 exceeds size of device (132096 blocks) [ 661.328567][T23720] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 661.336918][T23720] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000200040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000200002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:52 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300150005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:52 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300210005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005060025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000300040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000003f0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005070025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 661.961825][T23726] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 661.970590][T23726] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 661.982319][T23732] EXT4-fs (loop4): bad geometry: block count 2162787 exceeds size of device (132096 blocks) 22:24:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000400002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000400040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:52 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000020002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 662.013838][T23736] EXT4-fs (loop2): bad geometry: block count 1376355 exceeds size of device (132096 blocks) [ 662.091815][T23751] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 662.101076][T23751] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:53 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000030002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:53 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300220005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005080025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000500040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:53 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300160005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:53 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000050002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:53 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 662.900426][T23759] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 662.906567][T23764] EXT4-fs (loop2): bad geometry: block count 1441891 exceeds size of device (132096 blocks) [ 662.913961][T23759] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005090025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:53 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006302160005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:53 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000090002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 662.948599][T23767] EXT4-fs (loop4): bad geometry: block count 2228323 exceeds size of device (132096 blocks) [ 663.107174][T23783] EXT4-fs (loop2): bad geometry: block count 1442403 exceeds size of device (132096 blocks) [ 663.107449][T23784] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 663.136805][T23784] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:54 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000f00040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:54 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000c0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:54 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300230005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000000050a0025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:54 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300170005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:54 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000001800040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:54 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000f0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:54 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000002600040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:54 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300240005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 663.801169][T23796] EXT4-fs (loop4): bad geometry: block count 2293859 exceeds size of device (132096 blocks) [ 663.823108][T23800] EXT4-fs (loop2): bad geometry: block count 1507427 exceeds size of device (132096 blocks) 22:24:54 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000100002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:54 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000004100040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 663.850260][T23795] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 663.863850][T23795] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 663.976184][T23815] EXT4-fs (loop4): bad geometry: block count 2359395 exceeds size of device (132096 blocks) 22:24:55 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000006900040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040201", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300180005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000000050b0025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:55 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300250005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040202", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000402040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300260005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040302", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040402", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000003040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 664.745020][T23826] EXT4-fs (loop4): bad geometry: block count 2424931 exceeds size of device (132096 blocks) [ 664.759164][T23827] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 664.767219][T23832] EXT4-fs (loop2): bad geometry: block count 1572963 exceeds size of device (132096 blocks) [ 664.778909][T23827] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040502", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000204040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300190005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:55 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040602", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 664.857386][T23841] EXT4-fs (loop4): bad geometry: block count 2490467 exceeds size of device (132096 blocks) [ 664.938230][T23858] EXT4-fs (loop2): bad geometry: block count 1638499 exceeds size of device (132096 blocks) 22:24:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000000050c0025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000604040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040802", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300270005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:56 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040f02", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000005040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000041802", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 665.713302][T23869] EXT4-fs (loop2): bad geometry: block count 1704035 exceeds size of device (132096 blocks) [ 665.728269][T23872] EXT4-fs (loop4): bad geometry: block count 2556003 exceeds size of device (132096 blocks) [ 665.748803][T23873] EXT4-fs (loop1): revision level too high, forcing read-only mode 22:24:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000042602", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000006040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000044102", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 665.779906][T23873] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:56 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000406040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000046902", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000000050d0025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:56 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300280005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 665.901854][T23898] EXT4-fs (loop4): bad geometry: block count 2621539 exceeds size of device (132096 blocks) [ 665.912395][T23900] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 665.922198][T23900] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:57 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001b0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040003", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300290005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000000050e0025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040006", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000018040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040007", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 666.576711][T23909] EXT4-fs (loop4): bad geometry: block count 2687075 exceeds size of device (132096 blocks) [ 666.603996][T23906] EXT4-fs (loop2): bad geometry: block count 1769571 exceeds size of device (132096 blocks) [ 666.615483][T23913] EXT4-fs (loop1): revision level too high, forcing read-only mode 22:24:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000001f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063002a0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001c0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 666.626727][T23913] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 666.700137][T23927] EXT4-fs (loop4): bad geometry: block count 2752611 exceeds size of device (132096 blocks) [ 666.716700][T23932] EXT4-fs (loop2): bad geometry: block count 1835107 exceeds size of device (132096 blocks) 22:24:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) munlock(&(0x7f000041a000/0x2000)=nil, 0x2000) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000020040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040009", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063000000050f0025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063002b0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001d0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000026040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:57 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000004000c", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000004000f", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000003f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063002c0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001e0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 667.505312][T23942] EXT4-fs (loop4): bad geometry: block count 2818147 exceeds size of device (132096 blocks) [ 667.522641][T23945] EXT4-fs (loop2): bad geometry: block count 1900643 exceeds size of device (132096 blocks) [ 667.564949][T23944] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 667.580089][T23944] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000004003f", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063001f0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000040040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063002d0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005100025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000041040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040040", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 668.380929][T23970] EXT4-fs (loop4): bad geometry: block count 2949219 exceeds size of device (132096 blocks) [ 668.412868][T23973] EXT4-fs (loop2): bad geometry: block count 2031715 exceeds size of device (132096 blocks) 22:24:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040003", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000069040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063002e0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040004", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000030002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 668.426588][T23975] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 668.443538][T23975] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:24:58 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040006", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300200005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:58 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000002040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 668.555506][T23996] EXT4-fs (loop4): bad geometry: block count 3014755 exceeds size of device (132096 blocks) [ 668.573183][T24002] EXT4-fs (loop2): bad geometry: block count 2097251 exceeds size of device (132096 blocks) 22:24:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:24:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005110025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000003040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040007", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000063002f0005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006310200005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000004040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040009", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000004000c", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000005040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000004000f", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:24:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000006040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 669.357502][T24013] EXT4-fs (loop4): bad geometry: block count 3080291 exceeds size of device (132096 blocks) [ 669.386481][T24017] EXT4-fs (loop2): bad geometry: block count 2101347 exceeds size of device (132096 blocks) [ 669.470336][T24018] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 669.484189][T24018] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:25:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000008040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040010", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300300005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300210005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:25:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005120025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040001", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f00000000000f040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 670.272330][T24041] EXT4-fs (loop2): bad geometry: block count 2162787 exceeds size of device (132096 blocks) [ 670.281777][T24044] EXT4-fs (loop4): bad geometry: block count 3145827 exceeds size of device (132096 blocks) 22:25:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000018040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000026040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000041040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 670.316476][T24048] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 670.325148][T24048] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:25:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000069040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:00 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300310005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005140025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300220005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r2 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:25:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000050002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000090002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000c0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000013800), 0x0) [ 671.188611][T24085] EXT4-fs (loop2): bad geometry: block count 2228323 exceeds size of device (132096 blocks) [ 671.197230][T24082] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 671.207170][T24082] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:25:01 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300230005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300320005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005160025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000013800), 0x0) [ 671.229538][T24084] EXT4-fs (loop4): bad geometry: block count 3211363 exceeds size of device (132096 blocks) 22:25:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000f0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000013800), 0x0) 22:25:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000170002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) [ 671.297858][T24102] EXT4-fs (loop2): bad geometry: block count 2293859 exceeds size of device (132096 blocks) [ 671.438277][T24113] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 671.446648][T24113] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:25:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r3 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) process_vm_writev(r3, &(0x7f0000001540)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0, 0x84000000}, {&(0x7f0000000280)=""/217, 0xd9}], 0x3, &(0x7f0000001780)=[{&(0x7f00000015c0)=""/227, 0x7ffff000}, {0x0}], 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00007e5000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x99e66000) 22:25:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000013800), 0x0) 22:25:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000180002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:02 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300240005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:02 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300330005000025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000006300000005170025ce000b000f00c00c110000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef270000408000d7f4655f000000000100000001000005000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000200002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) 22:25:02 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000013800), 0x0) 22:25:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8100000, 0x1, &(0x7f0000000300)=[{&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000003f0002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800), 0x0) panic: bad group arg size 72, should be <= 0 for &prog.GroupArg{ArgCommon:prog.ArgCommon{ref:0x2de, dir:0x0}, Inner:[]prog.Arg{}} type "array" goroutine 14 [running]: github.com/google/syzkaller/prog.foreachArgImpl({0x8b4538, 0xc018b70fa0}, 0xc00b2ba840, 0xc002f1fd00) /syzkaller/gopath/src/github.com/google/syzkaller/prog/analysis.go:157 +0x5d9 github.com/google/syzkaller/prog.foreachArgImpl({0x8b4578, 0xc00bb86540}, 0xc00b2ba840, 0xc002f1fd00) /syzkaller/gopath/src/github.com/google/syzkaller/prog/analysis.go:164 +0x337 github.com/google/syzkaller/prog.ForeachArg(0xc00aa6bea0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/prog/analysis.go:123 +0x105 github.com/google/syzkaller/prog.(*Prog).MutateWithHints(0xc0180b0240, 0x1, 0xc00b2d82a0, 0xc002f1fd80) /syzkaller/gopath/src/github.com/google/syzkaller/prog/hints.go:78 +0xaa main.(*Proc).executeHintSeed(0xc0180b0240, 0x65e4a0, 0x1) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:248 +0xd2 main.(*Proc).smashInput(0xc0180b0240, 0xc017bc1470) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:214 +0x88 main.(*Proc).loop(0xc0180b0240) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:78 +0x125 created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:307 +0x15a5 [ 672.098911][T24120] EXT4-fs (loop2): bad geometry: block count 2359395 exceeds size of device (132096 blocks) [ 672.110309][T24125] EXT4-fs (loop4): bad geometry: block count 3342435 exceeds size of device (132096 blocks) [ 672.127417][T24130] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 672.138907][T24130] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue